Home Search
remote work - search results
If you're not happy with the results, please do another search
DevilsTongue – A New Spyware from Israeli Company Candiru
Not all malware variants are available on underground darknet markets. Some criminal syndicates design and supply them, especially for state-sponsored cyberattacks. In a recent...
Schneider Electric Patches 13 Vulnerabilities Affecting its EVlink Charging Stations
Schneider Electric, an energy management and automation company, has reportedly patched 13 critical vulnerabilities in its EVlink range of products. The EV product range...
Ransomware Alert! SonicWall Asks Users to Fix Flaws in SRA and SMA Products
Ransomware attacks have become sophisticated and continue to affect the cybersecurity community. The constant development of security defenses has become imperative for organizations amidst...
“Public GitHub is often a blind spot in the security team’s perimeter”
GitHub and the community surrounding it has changed the way the world uses and builds open source components and software. At present, there are...
Chinese Hacking Group ‘DEV 0322’ Exploits SolarWinds Serv-U Software: Microsoft
The infamous SolarWinds attacks have left a severe impact on the cybersecurity landscape. While organizations are still recovering from its consequences, Microsoft recently warned...
Magecart’s New Evasive Technique Hides Stolen Credit Card Data into Images
Cybercriminal group, Magecart, is infamously known for evolving its attack techniques to evade security detection. Magecart consists of multiple subgroups that target e-commerce sites...
ENISA Releases Cybersecurity Guide to Secure SMEs
The global pandemic led to swift digitization that eventually opened doors to several security issues. Cybercriminals are taking advantage of the situation by exploiting...
Thwarting Threats with a Zero Trust Security Posture
Hackers are breaching our nation’s critical infrastructure and with security threats lurking in the enterprise, Zero Trust adoption continues to rise. According to Cybersecurity...
Microsoft Raises Red Flag About Windows Print Spooler Vulnerability ‘PrintNightmare’
Despite regular security audits, several enterprises continue to suffer zero-day attacks more often. Unpatched vulnerabilities can give nightmares to organizations and allow a remote...
Pakistan-linked Hacker Suspected of Targeting Indian Power Companies with ReverseRat
Days after reports of cyberespionage campaigns by Chinese state-sponsored actors targeting the Indian power sector, security researchers uncovered a new cyber operation by suspected...