Security News

The May 2017 Cyberattack on the FCC That Never Happened

The May 2017 “Cyberattack” on the FCC That Never Happened!

As per recent reports, the official website of the FCC (Federal Communications Commission) hadn’t fallen victim to cyberattacks last year in May, as was initially assumed and reported. The surge…

Read More
SingHealth Cyberattack Allegedly the Work of Sophisticated APT Group

SingHealth Cyberattack Allegedly the Work of Sophisticated APT Group

The SingHealth cyberattack, which resulted in personal data of about 1.5 million patients getting stolen from SingHealth’s IT database, was the work of a sophisticated APT (Advanced Persistent Threat) group,…

Read More
Open EDR
Cyber Criminals are selling Hacking Tools on the Dark Web

Cyber Criminals are selling Hacking Tools on the Dark Web

It was found that cybercriminals have a place to dispose of their theft, and it is on the dark web market. There are different hacking tools that find their way…

Read More
BitPaymer Malware renders Mat Su Alaska Government to Reuse Typewriters

BitPaymer Malware made Mat-Su Alaska Gov’t to Reuse Typewriters

Electromagnetic pulse (EMP) attacks can render our advanced technology to recede as back to pre-industrial revolution stage. In other words, we in the corporate world will be forced back to…

Read More
Russian Hackers Reportedly Use Kaspersky Software to Steal U.S Cyber Secrets from NSA

How Businesses Can Prevent Software Vulnerabilities

In a new study made by cybersecurity firm Rapid 7, it was revealed that their company’s penetration testers had successfully exploited at least one software vulnerability to 84% of all…

Read More
Understanding Business Intelligence and Data Security

Customized Phishing Campaign that target High-Profile Business

A modern phishing campaign focusing on the industrial sector appears once again and demonstrated how attackers are continually enhancing at attracting high profile-clients into executing malware on their systems. Kaspersky…

Read More
Why Penetration Testing is Important

Why Penetration Testing is Important

For enterprises, encountering IT security vulnerabilities have become common incident around their enterprise networks and IT systems. These IT security vulnerabilities can possibly be cause by countless reasons that the…

Read More
Musical.ly Merges with TikTok App

Musical.ly Merges with Sister App TikTok

Popular video sharing app TikTok has finally absorbed sister app Musical.ly. TikTok’s parent company Bytedance acquired Musical.ly in 2017 for a deal reportedly worth around $1 Billion. Both TikTok and…

Read More
Facebook removes suspected Russian accounts

Facebook removes suspected Russian accounts

Facebook has found the “coordinated inauthentic network” that could be connected to the Internet Research Agency (IRA), a Russian-based group with connections to the Kremlin. This is amid fear that these…

Read More
Cybersecurity Industry’s Negligence with Securing the SME Business Sector

Did The Cybersecurity World Forget Small To Medium Businesses?

Officials at the Australian Small Business and Family Enterprise (ASBFE) recently released a small business statistical report detailing the pattern and health of Australia’s small-to-medium enterprise (SME) sector—and it’s not good…

Read More

Page 55 of 87

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register