IoT capable Printers Becoming Unofficial Gateways For Cyber Attacks

IoT- Capable Printers Becoming Unofficial Gateways For Cyber Attacks

The printer started as a simple device for printing on paper, providing users with a physical copy of their documents. However, this past decade, a printer even at home became…

Read More
Data Center Vulnerabilities Can Be Mitigated By Knowledgeable Operators

Data Center Vulnerabilities Can Be Mitigated By Knowledgeable Operators

We have repeatedly reported here in hackercombat.com about stories regarding email triggering malware intruding into the internal network and eventually leaking a considerable amount of personal information from data centers…

Read More
Open EDR
Malicious Torrent GoBotKR Targets South Korean TV

Malicious Torrent GoBotKR Targets South Korean TV

ESET researchers detected an ongoing malicious campaign by distributing backdoor torrents, using Korean TV content, and sometimes games like bait. The back door is spreading through torrent sites in South…

Read More
A DNS Exploit Is A Huge Risk That Can Disrupt The Internet

A DNS Exploit Is A Huge Risk That Can Disrupt The Internet

A cybercriminal who takes advantage of compromised credentials rather than having to hack a DNS server, warning a DNS expert, is what we call DNS-level attacks. This is getting popular…

Read More
Why it is Good for Online Gamers to Use a VPN

Why it is Good for Online Gamers to Use a VPN

Most gamers today don’t know why it’s good for them to use a VPN (Virtual Private Network). On the contrary, they tend to think that using a VPN could slow…

Read More
5G Technology and Cybersecurity Concerns 1

5G Technology and Cybersecurity Concerns

5G is a modern reality, and people don’t connect it with the future concept anymore. As leading network operators announce the beginning of this new era of smart connectivity at…

Read More
The Future of Web Filtering in the Era of 5G Networks 1

The Future of Web Filtering in the Era of 5G Networks

Security professionals and network administrators today are concerned with securing fifth-generation (5G) networks from digital dangers. Of the different technologies that they use very effectively for safeguarding 5G networks, DNS…

Read More
A Hacker Dumps Over One Billion User Records 1

A Hacker Dumps Over One Billion User Records

According to ZDNet, a hacker by the name Gnosticplayers reveals to them in February about wanting to put up data of over one billion users for sale. ZDNet finds that…

Read More
DDoS Attacks Hit Games Like Assassin’s Creed and Final Fantasy XIV

How Companies Fight DDoS Attacks?

The threat of DDoS (Denial-of-Service) attacks that send massive processing demands from multiple Internet-connected devices (be it a PC, a smartphone, a tablet or an IoT) to the target server…

Read More
How To Deal With DNS Vulnerabilities 1

How To Deal With DNS Vulnerabilities?

Believe it or not, in the early days of the Internet, all the domain names (nodes) it had been listed in just one file, the host file. Today, the host…

Read More

Page 1 of 3

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register