Monthly Archives: June 2017

Notpetya – The Petya variant used in the massive attack is a wiper disguised by a ransomware

According to the researchers, the Petya variant (NotPetya) used in the massive attack is a wiper disguised by a ransomware. In these hours the massive global attack based on Petya […]

Posted in Cyber Security News | Comments Off on Notpetya – The Petya variant used in the massive attack is a wiper disguised by a ransomware

Google Hacker found a new way to bypass Microsoft Windows Defender

The Google Project Zero expert Tavis Ormandy has found a flaw in Windows Defender that allow attackers to bypass the Microsoft anti-virus tool. The popular Google Project Zero hacker Tavis Ormandy has […]

Posted in Cyber Security News | Comments Off on Google Hacker found a new way to bypass Microsoft Windows Defender

Five Reasons Why You Shouldn’t Miss RSA® Conference 2017 Asia Pacific & Japan

SINGAPORE–(BUSINESS WIRE)–Cybersecurity has been top of mind with WannaCry, the Internet of Things, and new government regulations dominating technology conversations today. “In keeping with the spirit of broadening discussions, changing […]

Posted in Cyber Security News | Comments Off on Five Reasons Why You Shouldn’t Miss RSA® Conference 2017 Asia Pacific & Japan

Company fired an employee, he shut down water utility providers’ networks in 5 cities

A former employee was sentenced to one year and one day in prison for damaging the IT networks of several water utility providers across the US East Coast. Adam Flanagan (42) of […]

Posted in Cyber Security News | Comments Off on Company fired an employee, he shut down water utility providers’ networks in 5 cities

32TB of Windows 10 internal builds and portions of core source code leaked online

A massive dump of Microsoft’s confidential Windows 10 internal builds, and the source codes for private software has been leaked online. A huge trove of Microsoft internal Windows operating system […]

Posted in Cyber Security News | Comments Off on 32TB of Windows 10 internal builds and portions of core source code leaked online

TrickBot gang is back with new campaigns targeting Payment Processors and CRM Providers

Threat actors behind the financial trojan TrickBot have been updating its campaigns targeting Payment Processors and CRM Providers. Threat actors behind Banking Trojan TrickBot switched from financial institutions to Payment […]

Posted in Cyber Security News | Comments Off on TrickBot gang is back with new campaigns targeting Payment Processors and CRM Providers

Stack Clash vulnerability allows an attacker to execute code as root

Stack Clash is a local privilege escalation flaw in Linux, BSD, Solaris and other open source systems that allows an attacker to execute code as root. Linux, BSD, Solaris and other […]

Posted in Cyber Security News | Comments Off on Stack Clash vulnerability allows an attacker to execute code as root

The mighty have fallen: how even the unlikeliest targets are going down to DDoS attacks

Informative sources on distributed denial of service (DDoS) attacks will often include at least one warning that nearly every website on the internet is a potential target. With the current […]

Posted in Cyber Security News | Comments Off on The mighty have fallen: how even the unlikeliest targets are going down to DDoS attacks

Mexican Government was spying on Journalists and Activists with Pegasus Surveillance software

Journalists and activists in Mexico accused the government of spying on them with the powerful surveillance software Pegasus developed by the NSO Group. Journalists and activists in Mexico accused the […]

Posted in Cyber Security News | Comments Off on Mexican Government was spying on Journalists and Activists with Pegasus Surveillance software

NetQuest Enhances Cyber Intelligence Gathering with Industry’s First 100G Coherent Network Visibility Solution

I-9100’s automated visibility and survey capabilities offer superior access to modern 100G optical transport networks for national defense initiatives MOUNT LAUREL, NJ – June 13, 2017 – NetQuest Corporation, a […]

Posted in Cyber Security News | Comments Off on NetQuest Enhances Cyber Intelligence Gathering with Industry’s First 100G Coherent Network Visibility Solution

Pinkslipbot banking Trojan exploiting infected machines as control servers

Pinkslipbot banking Trojan is a banking Trojan that uses a complicated multistage proxy for HTTPS-based control server communication. Security researchers at McAfee Labs have spotted a new strain of the Pinkslipbot […]

Posted in Cyber Security News | Comments Off on Pinkslipbot banking Trojan exploiting infected machines as control servers

Buckle Inc. confirmed credit card breach at its stores

An official statement issued by the Buckle Inc. retail confirmed that a point-of-sale malware was discovered on cash registers at its stores. A few hours ago, the popular investigator and […]

Posted in Cyber Security News | Comments Off on Buckle Inc. confirmed credit card breach at its stores

Is it Legal to Use a VPN?

Many Internet users opt to use a VPN, or virtual private network, when accessing the Web. These types of services encrypt your data and hide your IP address, which can […]

Posted in Cyber Security News | Comments Off on Is it Legal to Use a VPN?

5 Reasons Why MFT Agents May Be Right For You

In this age of ever-growing security and business needs, finding a balance between secure data and immediate, remote file transfer (which can include the use of cloud environments) is incredibly […]

Posted in Cyber Security News | Comments Off on 5 Reasons Why MFT Agents May Be Right For You

Israeli Intelligence spotted IS plans for Laptop Bomb

Israeli cyber spies hacked into the operations of Islamic State bombmakers and discovered they were developing a laptop bomb to hit commercial air crafts, Israeli government spies hacked into the […]

Posted in Cyber Security News | Comments Off on Israeli Intelligence spotted IS plans for Laptop Bomb

Platinum hackers leverages Intel Active Management tools to bypass Windows firewall

The PLATINUM hacker group has developed a system leveraging Intel Active Management Technology (AMT) to bypass the Windows firewall. Microsoft is warning users of a new attack that leverage Intel’s […]

Posted in Cyber Security News | Comments Off on Platinum hackers leverages Intel Active Management tools to bypass Windows firewall

SECURE SWISS DATA LAUNCHES FULLY ENCRYPTED MOBILE APPLICATION

Zurich, Switzerland: Today, Secure Swiss Data, a company that specializes in protecting corporate data and individual privacy through their encrypted email and file sharing services, is launching a fully encrypted […]

Posted in Cyber Security News | Comments Off on SECURE SWISS DATA LAUNCHES FULLY ENCRYPTED MOBILE APPLICATION

INTERPOL World 2017 to Showcase the Latest Innovations for Future Security Challenges

SINGAPORE, 8 June 2017 – The stage is set for INTERPOL World 2017 as it readies to welcome over 10,000 law enforcement agencies, government bodies, academia, solution providers, security professionals, […]

Posted in Cyber Security News | Comments Off on INTERPOL World 2017 to Showcase the Latest Innovations for Future Security Challenges

NSA top-secret report details Russian cyber operations days before 2016 election

Russian intelligence powered a cyber attack on at least one US voting software supplier and sent spear-phishing emails to election officials just days before Election The online news outlet The […]

Posted in Cyber Security News | Comments Off on NSA top-secret report details Russian cyber operations days before 2016 election

Experts shut down tens of thousands of subdomains set up with a domain shadowing campaign

Experts killed tens of thousands of subdomains used by crooks to host the RIG Exploit Kit that were set up with a domain shadowing campaign. GoDaddy and RSA Security, with […]

Posted in Cyber Security News | Comments Off on Experts shut down tens of thousands of subdomains set up with a domain shadowing campaign

Insecure Hadoop Distributed File System installs 5 PB of Data

According to Shodan search, unprotected Hadoop Distributed File System installations expose 5 PB of data. Hadoop servers that are not securely configured expose vast amounts of data, according to an […]

Posted in Cyber Security News | Comments Off on Insecure Hadoop Distributed File System installs 5 PB of Data

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X