Search Results for: malicious hacker Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and... Blog Post CLOP Ransomware Suspects Busted in Ukraine – Money and Motors Seized June 28, 2021 Ukrainian police have arrested six people allegedly linked to the infamous CLOP ransomware gang. The police have finally reached them... Blog Post Rise of Cybersecurity Threats in Industrial Control Systems September 28, 2021 Long before the widespread of the internet, industrial control systems were inherently safe. They were air-gapped, which meant that no... Blog Post Over 500,000 Telnet Credentials are Exposed January 22, 2020 Telnet is a communication service protocol that helps a user in controlling a remotely connected device over the TCP/IP... Blog Post U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their... Blog Post Bots and Cybersecurity June 11, 2020 A bot is a software program that performs an automated task. These tasks are usually repetitive and run without interaction.... Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Blog Post The importance of Cyber Hygiene July 14, 2020 Much like practicing personal hygiene is important to maintaining good health and well-being, practicing cyber hygiene is vital to keeping... Blog Post What You Should Know About Cryptojacking June 2, 2020 Cryptojacking is a notorious method of tricking the victim to perform the crime of mining the cryptocurrency for the attacker.... Blog Post Phishing PDF Document Story March 24, 2020 Background A few days ago, the LIFARS Monitoring team detected a PDF file in the client network with a non-zero... Blog Post Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming... Blog Post Phone Policies: Installing Applications April 29, 2020 We Use GPS, connect to free WiFi, receive verification codes, register various APPs, and enjoy the convenient life brought by... Blog Post Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement... Blog Post Bluetooth LE Powered Devices are Affected by 12 Vulnerabilities February 20, 2020 Cybersecurity researchers discovered 12 potential security vulnerabilities that are considered severe last week. These vulnerabilities, which are identified as “SweynTooth”... Blog Post Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with...
Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and...
Blog Post CLOP Ransomware Suspects Busted in Ukraine – Money and Motors Seized June 28, 2021 Ukrainian police have arrested six people allegedly linked to the infamous CLOP ransomware gang. The police have finally reached them...
Blog Post Rise of Cybersecurity Threats in Industrial Control Systems September 28, 2021 Long before the widespread of the internet, industrial control systems were inherently safe. They were air-gapped, which meant that no...
Blog Post Over 500,000 Telnet Credentials are Exposed January 22, 2020 Telnet is a communication service protocol that helps a user in controlling a remotely connected device over the TCP/IP...
Blog Post U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their...
Blog Post Bots and Cybersecurity June 11, 2020 A bot is a software program that performs an automated task. These tasks are usually repetitive and run without interaction....
Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Blog Post The importance of Cyber Hygiene July 14, 2020 Much like practicing personal hygiene is important to maintaining good health and well-being, practicing cyber hygiene is vital to keeping...
Blog Post What You Should Know About Cryptojacking June 2, 2020 Cryptojacking is a notorious method of tricking the victim to perform the crime of mining the cryptocurrency for the attacker....
Blog Post Phishing PDF Document Story March 24, 2020 Background A few days ago, the LIFARS Monitoring team detected a PDF file in the client network with a non-zero...
Blog Post Egregor Ransomware Attacks Creating Uncertainty in Cyberspace December 10, 2020 A relatively newer cyber assault called egregor ransomware attack is making its name in the cyber world fast. It’s becoming...
Blog Post Phone Policies: Installing Applications April 29, 2020 We Use GPS, connect to free WiFi, receive verification codes, register various APPs, and enjoy the convenient life brought by...
Blog Post Maze Ransomware: An Infamous Cybercriminal Group Announces to Shut Down its Operations December 1, 2020 In a press release, a notorious cybercriminal group named Maze proclaims to shut down its operations. Ever since the announcement...
Blog Post Bluetooth LE Powered Devices are Affected by 12 Vulnerabilities February 20, 2020 Cybersecurity researchers discovered 12 potential security vulnerabilities that are considered severe last week. These vulnerabilities, which are identified as “SweynTooth”...
Blog Post Attacks Are Getting Pricier: Average Ransomware Payment Ramped Up By 60% January 4, 2021 Ransomware is a severe and recurring cyberattack nowadays. It happens when a cyber threat actor locks a company’s data with...