Ransomware protection software save your valuable files from turning into gibberish encryption. Ransomware has gained popularity among malware authors for the extortion of money from companies and their customers. Ransomware…
Categories
Web skimming led US Transport Authority to shut down its online store. The Southeastern Pennsylvania Transport Authority (SEPTA) recently faced a data skimming Magecart attack where data of 761 customers…
Categories
European Central Bank has recently become the victim of a cyber attack. The attack was successfully deployed by injecting a malware into one of the websites of the bank. Apparently,…
Categories
Vulnerabilities are the anomalies such as programming errors or configuration issues of the system. Attackers exploit the weaknesses in the system and can, in turn, disrupt the system. If these…
Categories
Not even half the year has passed; cyber-attacks have already terrorized the world. However, attack vectors like Phishing and Ransomware have caused the maximum loss to organizations across the globe,…
Categories
The investigation bureau FBI has issued an alert warning to internet users that "HTTPS" and a padlock icon in the address bar might not be enough to prove if a…
Categories
In May 2018, a gang called ‘Carbanak’ tricked two employees of an east European bank into opening a spear-phishing email that consisted of a malicious document containing three exploits for…
Categories
In today’s scenario, one of the emerging situations of concern is cyber-crime. Cyber criminals are opting for sophisticated attack methodologies that are more difficult to be detected. On an average,…
Categories
Two government organizations in two different Middle East countries were attacked by the Chinese hacker group known as ‘Emissary Panda’. Allegedly, the hacker group has exploited a recently patched vulnerability…
Categories
Cyber security awareness is an essential part of something that can be considered equivalent to the vault that has all your valuables in it. It is extremely vulnerable and requires…