Browsing the "cyber attacks" Tag

New USBCulprit Espionage Tool Steals Data From Air-Gapped Computers

June 5th, 2020 📆 | 8054 Views ⚑

A Chinese threat actor has developed new capabilities to target air-gapped systems in an attempt to exfiltrate sensitive data for

Tagged with:




New USBCulprit Espionage Tool Steals Data From Air-Gapped Computers

June 5th, 2020 📆 | 7579 Views ⚑

A Chinese threat actor has developed new capabilities to target air-gapped systems in an attempt to exfiltrate sensitive data for

Tagged with:




Two Critical Flaws in Zoom Could’ve Let Attackers Hack Systems via Chat

June 5th, 2020 📆 | 2144 Views ⚑

If you’re using Zoom—especially during this challenging time to cope with your schooling, business, or social engagement—make sure you are

Tagged with:




Webinar SAP Cybersecurity Framework A Five Step Guide to Securing SAP Systems from Cyber Attack Without Breaking the Bank

June 1st, 2020 📆 | 5820 Views ⚑

With SAP® solutions deployed by 85 percent of Forbes 500 companies, they are a prized target for cyber attackers. Watch

Tagged with:




Critical ‘Sign in with Apple’ Bug Could Have Let Attackers Hijack Anyone’s Account

May 30th, 2020 📆 | 5120 Views ⚑

Apple recently paid Indian vulnerability researcher Bhavuk Jain a huge $100,000 bug bounty for reporting a highly critical vulnerability affecting

Tagged with:




New Bluetooth Vulnerability Exposes Billions of Devices to Hackers

May 27th, 2020 📆 | 2316 Views ⚑

Academics from École Polytechnique Fédérale de Lausanne (EPFL) disclosed a security vulnerability in Bluetooth that could potentially allow an attacker

Tagged with:




Chinese Researchers Disrupt Malware Attack That Infected Thousands of PCs

May 27th, 2020 📆 | 5497 Views ⚑

Chinese security firm Qihoo 360 Netlab said it partnered with tech giant Baidu to disrupt a malware botnet infecting over

Tagged with:




Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets

May 24th, 2020 📆 | 8483 Views ⚑

Since the past few weeks, software giant Citrix has privately been rolling out a critical software update to its enterprise

Tagged with:




An Undisclosed Critical Vulnerability Affect vBulletin Forums — Patch Now

May 23rd, 2020 📆 | 3163 Views ⚑

If you are running an online discussion forum based on vBulletin software, make sure it has been updated to install

Tagged with:




New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks

May 21st, 2020 📆 | 5611 Views ⚑

Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified,

Tagged with:




Characterizing Cyber-Physical Attacks on Water Distribution Systems

May 20th, 2020 📆 | 7684 Views ⚑

Music: Chris Collins, indiemusicbox.com Author Affiliations: Riccardo Taormina: iTrust Centre for Research in Cyber Security, Singapore University of Technology and

Tagged with:




U.S Defense Warns of 3 New Malware Used by North Korean Hackers

May 17th, 2020 📆 | 6229 Views ⚑

Yesterday, on the 3rd anniversary of the infamous global WannaCry ransomware outbreak for which North Korea was blamed, the U.S.

Tagged with:




HTTP Status Codes Command This Malware How to Control Hacked Systems

May 15th, 2020 📆 | 4345 Views ⚑

A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes

Tagged with:




Google Accidentally Shared Private Videos of Some Users With Others

February 5th, 2020 📆 | 5970 Views ⚑

Google might have mistakenly shared your private videos saved on the company’s servers with other users, the tech giant admitted

Tagged with:




Zoom Bug Could Have Let Uninvited People Join Private Meetings

February 1st, 2020 📆 | 2901 Views ⚑

If you use Zoom to host your remote online meetings, you need to read this piece carefully. The massively popular

Tagged with:




3 Google Play Store Apps Exploit Android Zero-Day Used by NSO Group

January 30th, 2020 📆 | 4057 Views ⚑

Watch out! If you have any of the below-mentioned file managers and photography apps installed on your Android phone—even if

Tagged with:




Broadening the Scope: A Comprehensive View of Pen Testing

January 16th, 2020 📆 | 5431 Views ⚑

Penetration tests have long been known as a critical security tool that exposes security weaknesses through simulated attacks on an

Tagged with: