Home Blog Page 57
There has been a significant traction in the security industry with growth in the antivirus market.  According to the “Industry Arc Antivirus Market – Forecast (2021 - 2026) report,” the global antivirus market is expected to grow at a...
The Linux operating system is famous for its flexibility and open-source nature. It also powers many cloud infrastructures. However, the popularity of Linux grew along with its threat landscape. Like other operating systems, Linux systems are not immune to...
Australia is constantly trying to boost its cybersecurity capabilities to mitigate rising threats of remote access scams and identity thefts. The government recently passed the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, allowing the Australian Federal Police (AFP) and the...
In today’s evolving digital world, a supply chain attack, in particular, is not a new threat. In fact, 80% of the retail data breach is due to supply chain attacks. Today, a growing number of hackers are adopting sophisticated...
Internet of Things (IoT) devices raise critical security concerns for ethical hackers as these devices are easy to hack with IoT hacking tools. More than 70% of IoT devices are soft targets for hackers because of a lack of security...
The recent surge in ransomware attacks is an indication that threat actors have become bolder, more sophisticated and equipped with advanced extortion schemes. In their regular ransomware hunting operations, Palo Alto Networks Unit 42 threat intelligence team discovered four...
A configuration issue in Microsoft Power Apps resulted in a massive data breach, exposing the sensitive information of millions of users. An analysis from information security firm UpGuard revealed that over 38 million records from 47 different government and...
Today, no industry sector is safe from cyberattacks, as threat actors target businesses with a malicious aim of gaining information or monetary benefits. The digital age has undoubtedly ushered in beneficial changes in the life and work of many....
In a new kind of insider threat campaign, cybersecurity researchers found a Nigerian cybercriminal group enticing unwitting employees by offering them a share of their presumed ransom if they deploy Black Kingdom ransomware, also known as DemonWare or DEMON,...
While organizations are battling to boost their cybersecurity capabilities, cybercriminals continue to prey on security loopholes. Active exploitation of unpatched vulnerabilities has become a common attack vector today. The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a warning...