A company that fell victim to a ransomware attack and paid cyber criminals millions for the decryption key to restore their network fell victim to the exact same ransomware gang under two weeks later after failing to examine why the attack was able to happen in the first place. The unnamed company fell victim to […]
Requesting ransoms in cryptocurrency like Bitcoin and Monero gives cybercriminals a stateless, decentralized, and anonymized method of transferring funds. This makes payments easier to facilitate than a wire transfer or international payment in fiat currencies and reduces the risk of apprehension. Unlike bank accounts, crypto wallets can be anonymously created and accessed by anyone who […]
The U.S. Department of Homeland Security’s Office of Intelligence and Analysis assess that ransomware attacks targeting US networks are likely to increase in the near and long term because cybercriminals have developed effective business models to increase their financial gain, likelihood for operational success, and anonymity. Growing demand for ransomware-as-a-service (RaaS) and the use of […]
Zoom went from having 10 million daily users in December 2019 to having 200 million daily users in March 2020. While several sectors suffer from the COVID-19 (coronavirus) pandemic, Zoom is one of the companies that is reaping huge benefits. Zoom gained over 1,900% in usage for claiming to offer end-to-end encryption and protecting the […]
Marriott International finds itself a victim of another major data breach, making it the second attack the hotel chain company has suffered in the past three years. The company announced on March 31st with details of the breach which affected 5.2 million hotel guests. The breach started in mid-January this year and went on for […]
Hackers always exploit vulnerabilities in architectural designs of IT devices and their unsuspecting users (individuals, organizations, corporations). As the world is currently at a standstill as a result of the Coronavirus (COVID-19), it is no better time to have unsuspecting users waiting to be preyed on. The past seven days has seen reported cases of […]
Cyberattacks have been a major concern for companies and governments, especially in the last decade. Companies and governments store large amounts of valuable information on their systems’ hardware, and without proper security, sensitive information may be vulnerable to cyberattacks. These attacks are sometimes used by malicious agents to obtain trade secrets and, therefore, gain an […]
According to reports from Microsoft Corporation, hackers are exploiting two unpatched zero-day flaws that are present in all its supported versions of Windows operating system; Windows 10, 8.1 and Server 2008, 2012, 2016, 2019 editions, and Windows 7 which Microsoft ended its support in January, 2020. The two unpatched Remote Code Execution (RCE) vulnerabilities are […]
Adobe recently released an out-of-bound security update for a flaw in the Windows version of its Creative Cloud Desktop Application. The flaw was caused by a time-of-check to time-of-use (TOCTOU) race condition, a condition that occurs when two or more system operations attempt to make changes to a shared data. When the race condition is […]
According to a study Infrascale conducted in March of this year, about 21% of small to medium scale businesses lack data backup or disaster recovery solutions. The study was conducted using over 500 C-level executives, with CEOs consisting of 87% of the participant group. The remainder of the group were CTOs and CIOs. 58% of […]