Cyber Security
Steps to recover from a Ransomware Attack
Ransomware is considered to be the most threatening cybersecurity risk for organizations. Last year more than 50 percent of all businesses were hit ...
Cyber Security
DDoS attacks increased remarkably this year
There has been a significant increase in the number of distributed denial of service (DDoS) attacks in the first half of this year. ...
Cyber Security
Phishing tricks – Top Ten Treacheries of 2020
Sophos Phish Threat is a phishing attack simulator that allows your IT department send realistic-looking fake phishes to your own staff to educate ...
Cyber Security
India bans 118 apps including PUBG, Baidu, AliPay
The Indian Ministry of Electronics and Information Technology have banned another 118 apps either linked or based in China, stating that they are ...
Cyber Security
Netflix credential phishing hides behind working CAPTCHA
A new flow of phishing attacks targeted to steal payment card details and credentials for Netflix streaming service starts with redirecting to a ...
Cyber Security
US agencies offer $2M reward for Ukrainian hackers
The US State Department and Secret Service offered $2 million in reward money for capturing two Ukrainian hackers who have been charged with ...
Cyber Security
Two Chinese hackers charged for targeting COVID-19 research
The U.S. Department of Justice (DoJ) charged two Chinese nationals for their involvement in a decade-long hacking spree targeting protesters, government agencies and ...
Cyber Security
Argentinian telecom supposedly hit by Monero Ransomware
Telecom Argentina, one of the largest internet service providers in Argentina was hit with a ransomware attack and the ransomware operators are demanding ...
Cyber Security
Google bans stalkerware, spyware ads
Google has announced that they have planned to ban ads that promote stalkerware, spyware, and other forms of surveillance technology which could be ...
Cyber Security
Microsoft seizes domains used in COVID-19-related cybercrime
Microsoft took down the domains which were used by criminals to launch phishing attacks related to the Covid-19 pandemic by exploiting the vulnerabilities ...