Search Results for: usernames Blog Post Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in... Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The... Blog Post What is Cybersecurity? February 26, 2020 Cybersecurity is the technology of protecting networks, devices, and data from unauthorized access or criminal use. In terms of Cybersecurity,... Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Blog Post SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux Systems January 26, 2022 A new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been... Blog Post Notorious Ransomware Gang Crushed by FBI in International Operation December 13, 2021 REvil, a notorious Eastern-European cybersecurity gang that has been blamed for major attacks on global businesses, has recently been compromised... Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and... Blog Post FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... Blog Post Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts.... Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from... Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over... Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across... Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,... Blog Post Dunkin’ Donuts Data Breach November 29, 2018 Dunkin’ Donuts has just released a statement that their DD Perks member accounts were breached by a third-party entity. This... Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to...
Blog Post Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in...
Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The...
Blog Post What is Cybersecurity? February 26, 2020 Cybersecurity is the technology of protecting networks, devices, and data from unauthorized access or criminal use. In terms of Cybersecurity,...
Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to...
Blog Post SysJoker – A New Multi-Platform Backdoor Malware Targeting Microsoft, Mac, and Linux Systems January 26, 2022 A new, multi-platform backdoor malware was discovered in December 2021, targeting Windows, Linux, and Mac systems. The backdoor has been...
Blog Post Notorious Ransomware Gang Crushed by FBI in International Operation December 13, 2021 REvil, a notorious Eastern-European cybersecurity gang that has been blamed for major attacks on global businesses, has recently been compromised...
Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and...
Blog Post FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances....
Blog Post Groove Ransomware Gang Attracts Affiliates by Attempting New Tactic October 5, 2021 Recently, a new ransomware gang named Groove has sparked the resurgence of cybercrimes to deal a blow to cybersecurity experts....
Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from...
Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over...
Blog Post Data Breach: Attackers Breached Systems of United Nations October 4, 2021 As the shocking news recently emerged that hackers breached the computer networks of the United Nations, it sent shockwaves across...
Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,...
Blog Post Dunkin’ Donuts Data Breach November 29, 2018 Dunkin’ Donuts has just released a statement that their DD Perks member accounts were breached by a third-party entity. This...
Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to...