Hackers always exploit vulnerabilities in architectural designs of IT devices and their unsuspecting users (individuals, organizations, corporations). As the world is currently at a standstill as a result of the Coronavirus (COVID-19), it is no better time to have unsuspecting users waiting to be preyed on. The past seven days has seen reported cases of […]
Cyberattacks have been a major concern for companies and governments, especially in the last decade. Companies and governments store large amounts of valuable information on their systems’ hardware, and without proper security, sensitive information may be vulnerable to cyberattacks. These attacks are sometimes used by malicious agents to obtain trade secrets and, therefore, gain an […]
According to reports from Microsoft Corporation, hackers are exploiting two unpatched zero-day flaws that are present in all its supported versions of Windows operating system; Windows 10, 8.1 and Server 2008, 2012, 2016, 2019 editions, and Windows 7 which Microsoft ended its support in January, 2020. The two unpatched Remote Code Execution (RCE) vulnerabilities are […]
Adobe recently released an out-of-bound security update for a flaw in the Windows version of its Creative Cloud Desktop Application. The flaw was caused by a time-of-check to time-of-use (TOCTOU) race condition, a condition that occurs when two or more system operations attempt to make changes to a shared data. When the race condition is […]
According to a study Infrascale conducted in March of this year, about 21% of small to medium scale businesses lack data backup or disaster recovery solutions. The study was conducted using over 500 C-level executives, with CEOs consisting of 87% of the participant group. The remainder of the group were CTOs and CIOs. 58% of […]
Ransomware attacks are popular for how they operate: they steal data, encrypt them and offer them back to their victims at a price – ransom. The response of victims depends on the value they place on the data, and most times, every single piece of data is valuable. Successful attacks are popular for raking in […]
A hacking group (Digital Revolution) recently released documents of an alleged project by Russian intelligence to build an IoT botnet that functions like Mirai Botnet. The project, aliased Fronton, is linked with the Federal Security Service (FSB). Digital Revolution claims that the documents, created between 2017 and 2018 were retrieved from 0Day in 2019. 0Day […]
The lockdown of countries as a result of the COVID-19 pandemic has forced billions of people to stay at home. Employees have been forced to work remotely, schools are on lockdown and social activities are on hold, except social media and the internet. As we know, a time like this presents opportunities for cybercriminals and […]
The past year has seen changes in the way that malware threat actors extort money from their victims. In 2019, the operators of Maze Ransomware started publishing files of their victims on hack forums if they refused to pay the stipulated ransom. And since then, there has been an increasing adoption of this model by […]
As seen in every major pandemic, epidemic or any other global difficulty that humanity has experienced, other than panicking, some people take this time as a prime period to scam others. The pandemic of COVID-19 (Coronavirus) is no exception. Scammers of all kinds are using this pandemic to steal, hurt and otherwise inconvenience other individuals […]