Search Results for: bad cyber actor Blog Post North Korea is Reusing Malware! What Does This Mean? February 29, 2020 Among the hacking groups from North Korea, there is a group called Lazarus has plundered and pillaged the global internet,... Blog Post Is Your Smart TV Watching You? Warning from FBI December 29, 2019 Is Your Smart TV Watching You? How Can You Build a Digital Defense With Your Smart TV? If you just... Blog Post LIFARS Cyber Security Training Video Gallery December 27, 2018 Free Cyber Security Awareness Training and Career Development Videos Learn cybersecurity basics with these essential videos from the LIFARS’s Experts.... Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated... Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The... Blog Post Cyberattacks Targeted US Water and Wastewater Facilities November 3, 2021 On October 14, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) has released a joint cybersecurity advisory. Its substance was... Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered... Blog Post Importance Of Partnership Against Cybersecurity Threats August 31, 2021 It is the governments’ responsibility to help keep law and order. Nevertheless, the sheer complexity of cyberspace has shown that... Blog Post FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau... Blog Post Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple... Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers.... Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber... Blog Post Top Cyberattacks of 2020 that Made People Take Cybersecurity Seriously February 1, 2021 Do you know cybercrime may become the third-largest economy by 2021? Sadly, it is the case since the damages causing... Blog Post Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started... Blog Post Top 10 Cyber Threat Actors in 2020 April 9, 2020 As our sensitive data, bank details, sentimental photos, private messages are priceless, it is important to use the best antivirus...
Blog Post North Korea is Reusing Malware! What Does This Mean? February 29, 2020 Among the hacking groups from North Korea, there is a group called Lazarus has plundered and pillaged the global internet,...
Blog Post Is Your Smart TV Watching You? Warning from FBI December 29, 2019 Is Your Smart TV Watching You? How Can You Build a Digital Defense With Your Smart TV? If you just...
Blog Post LIFARS Cyber Security Training Video Gallery December 27, 2018 Free Cyber Security Awareness Training and Career Development Videos Learn cybersecurity basics with these essential videos from the LIFARS’s Experts....
Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated...
Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The...
Blog Post Cyberattacks Targeted US Water and Wastewater Facilities November 3, 2021 On October 14, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) has released a joint cybersecurity advisory. Its substance was...
Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...
Blog Post Importance Of Partnership Against Cybersecurity Threats August 31, 2021 It is the governments’ responsibility to help keep law and order. Nevertheless, the sheer complexity of cyberspace has shown that...
Blog Post FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau...
Blog Post Purple Fox Malware Now Evolves to Spread Itself Across Windows Machines April 9, 2021 Purple Fox has incorporated a new technique into its arsenal, allowing it to spread itself across windows machines. Essentially, Purple...
Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers....
Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber...
Blog Post Top Cyberattacks of 2020 that Made People Take Cybersecurity Seriously February 1, 2021 Do you know cybercrime may become the third-largest economy by 2021? Sadly, it is the case since the damages causing...
Blog Post Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started...
Blog Post Top 10 Cyber Threat Actors in 2020 April 9, 2020 As our sensitive data, bank details, sentimental photos, private messages are priceless, it is important to use the best antivirus...