Home Blog Page 53
Researchers uncovered active exploitation of a zero-day remote code execution vulnerability in the main HTML component of the now-discontinued Internet Explorer browser. Microsoft warned that unknown hackers are exploiting the vulnerability tracked as CVE-2021-40444 to compromise vulnerable Windows systems...
Most news on ransomware attacks is about U.S. organizations. We hear little about ransomware attacks in India, as few organizations report it. That’s not to say that Indian companies are spared. In fact, India is the fifth most attacked...
It seems like New Zealand is becoming a new cyberthreat landscape with regular security incidents. Months after a cyberattack on the New Zealand reserve bank, attackers reportedly targeted several banks, financial institutions, and postal services in the country. CERT NZ...
When we think of cybersecurity our mind automatically goes to powerful software protecting “soft” assets i.e. data that could range from massive enterprise-grade datastores to tiny files that contain sensitive data about someone.  By Neil Okikiolu, Founder/CEO of Simius Technologies Inc.  These “soft” assets have been...
Not all ransomware gangs break into targeted networks. They often purchase access to victims’ networks from other cybercriminal groups and initial access brokers (IABs) on dark web forums.  IABs are cybercriminal affiliates who breach a corporate network via brute-force...
Though the Internet is a good resource for endless knowledge, it also has its share of risks. Unlike adults, most kids and teens are not aware of the security hazards while surfing online.  The Internet has become a part...
Sniffing attacks are gaining prominence among cybercriminals today to steal customer data and compromise network security. Sniffing attacks, a significant security risk, enable common network threat types such as man-in-the-middle attacks, insider threats etc. They pose a crucial challenge to...
Volumes have been written extolling the virtues and benefits of cloud computing. The cloud enables organizations to scale up rapidly and to be more agile. There are cost-savings and efficiencies too, which can be leveraged through various cloud models....
Attack vectors range from malicious attachments to weaponized PDFs.  These vectors have been continually evolving over the years. Recently, security experts from Anomali uncovered a malicious phishing campaign that used weaponized Windows 11 Alpha-themed Word docs with Visual Basic...
Organizations in the U.S. continue to sustain series of unpatched vulnerability exploits. The U.S. Cyber Command (USCYBERCOM) recently warned organizations to patch the actively exploiting Atlassian Confluence critical vulnerability CVE-2021-26084 immediately. “Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and...