News

Operation Eligible Receiver – The Birthplace of Cybersecurity: Vulnerabilities

More than 20 years ago, the NSA conducted an exercise named Operation Eligible Receiver 97. The purpose…

Beyond GDPR: key cyber security concerns

GDPR has now been in force for over two months and has brought with it a whole…

FOUR CONCRETE WAYS THREAT INTELLIGENCE CAN MAKE ORGANIZATIONS SAFER

by Jonathan Zhang, Founder and CEO, Threat Intelligence Platform, A Cyber Defense Magazine Exclusive Thought Leadership Article …

Oracle warns of CVE-2018-3110 Critical Vulnerability in Oracle Database product, patch it now!

Last week Oracle disclosed a critical vulnerability in its Oracle Database product, the issue tracked as CVE-2018-3110 has…

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying…

DNS Hijacking targets Brazilian financial institutions

Crooks are targeting DLink DSL modem routers in Brazil to redirect users to fake bank websites by carrying…

Some of the world’s biggest crimes go unnoticed, until it’s too late

As the way we live and work becomes increasingly sophisticated, complex and connected, the benefits are clear…

Social Mapper – Correlate social media profiles with facial recognition

Trustwave developed Social Mapper an Open Source Tool that uses facial recognition to correlate social media profiles…

Researchers find vulnerabilities in WhatsApp that allow to spread Fake News via group chats

WhatsApp has been found vulnerable to multiple security flaws that could allow malicious users to spread fake…

Ramnit is back and contributes in creating a massive proxy botnet, tracked as ‘Black’ botnet

Security researchers at Checkpoint security have spotted a massive proxy botnet, tracked as ‘Black’ botnet, created by…

Show Buttons
Hide Buttons