Posts

Showing posts from February, 2022

Jester Stealer is The Latest Addition To The Growing List Of Infostealing Malware

Android Visual Voice Mail App Vulnerability Allows For Eavesdropping of Voice Messages

SockDetour Found As A Backup Backdoor In TiltedTemple APT Campaign

Microsoft Defender For Cloud Now Supports Google Cloud

Horde Webmail XSS Vulnerability Allows for Account Takeover

Xenomorph Banking Trojan Garnered 50K Downloads On Play Store

Researcher Warns: Samsung Phones’ ‘TrustZone’ Is Actually ‘No-Trust Zone’

Extensis Portfolio Vulnerability Could Allow Remote Code Execution

Infection Monkey – An Open Source Tool for Testing a Data Center’s Resiliency to Breaches

Everything You Need to Know About API Security in 2022

The 7 critical backup strategy best practices to keep data safe

The Impact of Cybersecurity Fraud on Different Sectors

Multiple Vulnerabilities Found In Zabbix IT Monitoring Platform

The Best Practices of Security Testing

New York Stock Exchange Considering NFT Marketplace – Security Remains Critical Issue

Microsoft Rolled Out “Enhanced Security” Features With Edge 98

VPN for Streaming – Do You Need One?

HR Departments in the Spotlight: Increased Threat of Cyber Data Breaches

Vulnerability In UpdraftPlus WordPress Plugin Could Expose Backups

Virtualization in Cloud Computing: Features and Benefits

New Unredacter Tool Extracts Text From Pixelized Images

Squirrelwaffle Malware Loader Exploits Vulnerable Microsoft Exchange Servers

Brakeman – A Code Security Auditing Tool for Ruby

Red Cross Cyberattack Links Back To A Zoho ManageEngine Vulnerability

5 Fail-Safe Ways to Back Up Your Data

Remote Code Execution Bug Found In Apache Cassandra – Patch Now!

6 Best OSINT Tools for Penetration Testing

Best Tech Jobs In the UK

Windows vs. Linux: Which environment is more beneficial for use in Virtual Private Server (VPS)?

8 Ways to Secure Your Home Wi-Fi Network

Log4j Vulnerabilities: What Are They, and Are You at Risk?

SecLists – A Pentester’s BFF

Latest Kali Linux 2022.1 Version Arrives With “Everything” Flavor And More

Croatian Network A1 Hrvatska Disclosed Data Breach

4 Benefits of Earning Your Masters in Cyber Security

Zero-Day Bugs Spotted In Nooie Baby Monitors

Adobe Warns Users Of A Critical Magento Zero-Day Vulnerability Under Attack

Apple Patched A Zero-Day Under Attack With iOS 15.3.1

Critical Code Execution Bugs Found In PHP Everywhere WordPress Plugin

Signal App Launches Change Number Feature While Retaining Old Data

How Does a WAF detect and respond to attacks?

Malicious QR Codes Flood Twitter To Deliver a Malicious Chrome Extension

SOAR: What it is, how it works, and its main advantages

“Merry-Maker” Card Skimmer Scanner Tool Released As Open Source

Researchers Found Zimbra Zero-Day XSS Vulnerability Under Attack

Microsoft February Patch Tuesday Addresses 51 Bugs Including A Zero-Day

A Traveler’s Guide to Keeping Your Private Information Safe

Mind the Password Hack Tool

Security During Virtual Meetings

Popular VPNs NordVPN And Surfshark Announce Merger

5 Steps to Becoming a Cybersecurity Consultant

Software development, implementation and support services

Glasswall Solutions

Researchers Devise “DrawnApart” – A GPU Fingerprinting Technique

UK NCSC Rolls Out SME NMAP Scripts To Detect Vulnerabilities

Google Launched Differential Privacy Tool for Python Developers

New Phishing Campaign Delivers AsyncRAT Malware

Google Removed Fake Authenticator App From Play Store That Dropped Vultur Malware

Phishing Campaign Registers Attacker’s Device With Victim Network