What is an RDP attack?
Remote Desktop Protocol (RDP) attacks are becoming a nightmare for CISOs, CIOs, CTOs, and network administrators. They are an attack vector to enterprise networks....
Over 100,000 Zyxel Devices Vulnerable to Secret Backdoor
Researchers from EYE discovered a hardcoded credential vulnerability in Zyxel’s firewalls, VPN gateways, and access point controllers that could allow attackers root access to...
Sparrow: CISA’s Free Anomalies Detection Tool for Azure/M365 Environment
The Cybersecurity and Infrastructure Security Agency (CISA) has launched a detection tool to identify any unusual or malicious activities in an Azure/Microsoft O365 environment....
How to Secure Your Mobile Apps
Despite multiple security scans, malicious applications make their way into your mobile devices. Most of these unsecured or malicious apps come with several security...
How Cyberattacks Cause Severe Hazards to Health Care Industry
Cyberattacks on health care organizations have become rampant in 2020. With multiple data breaches and ransomware attacks, the health care providers continued to be...
White House Confirms Cyberattack on U.S. Dept of Treasury and Commerce
The White House on Sunday acknowledged reports that a group backed by a foreign government carried out a cyberattack on the U.S. Department of...
5G Adoption Comes with Its Own Share of Security Apprehensions: Research
While 5G technology is taking the world by storm with its incredible high speeds and low latency, several organizations have their own set of...
Spoofed Wi-fi: A Major Threat to Your Device Security
Public hotspots are great. No matter whether there’s an issue with your service provider or you simply don’t want to waste your data plan,...
“We’ll see more attacks that target cloud misconfiguration issues”
Ravi Ivaturi is Sr. Vice President – Digital Security Architecture at Citi. He is a cybersecurity leader with deep expertise in building cybersecurity programs...
Fine-tune Your Passwords! Researchers Find Hackers Targeting Spotify Users
Security experts from vpnMentor uncovered a potential credential stuffing attack exploiting the personal data of Spotify users. The researchers found an unencrypted Elasticsearch database...














