Zoom went from having 10 million daily users in December 2019 to having 200 million daily users in March 2020. While several sectors suffer from the COVID-19 (coronavirus) pandemic, Zoom is one of the companies that is reaping huge benefits. Zoom gained over 1,900% in usage for claiming to offer end-to-end encryption and protecting the […]
Blog Grid
Marriott International finds itself a victim of another major data breach, making it the second attack the hotel chain company has suffered in the past three years. The company announced on March 31st with details of the breach which affected 5.2 million hotel guests. The breach started in mid-January this year and went on for […]
Hackers always exploit vulnerabilities in architectural designs of IT devices and their unsuspecting users (individuals, organizations, corporations). As the world is currently at a standstill as a result of the Coronavirus (COVID-19), it is no better time to have unsuspecting users waiting to be preyed on. The past seven days has seen reported cases of […]
Cyberattacks have been a major concern for companies and governments, especially in the last decade. Companies and governments store large amounts of valuable information on their systems’ hardware, and without proper security, sensitive information may be vulnerable to cyberattacks. These attacks are sometimes used by malicious agents to obtain trade secrets and, therefore, gain an […]
According to reports from Microsoft Corporation, hackers are exploiting two unpatched zero-day flaws that are present in all its supported versions of Windows operating system; Windows 10, 8.1 and Server 2008, 2012, 2016, 2019 editions, and Windows 7 which Microsoft ended its support in January, 2020. The two unpatched Remote Code Execution (RCE) vulnerabilities are […]
Adobe recently released an out-of-bound security update for a flaw in the Windows version of its Creative Cloud Desktop Application. The flaw was caused by a time-of-check to time-of-use (TOCTOU) race condition, a condition that occurs when two or more system operations attempt to make changes to a shared data. When the race condition is […]