Blog
Articles on cyber-security and latest trends
FEATURED POSTS

North Korean Hackers Took Advantage of a Chrome zero-day Vulnerability Before the Patch Was Released

Details Behind the REvil Ransomware Group’s Arrest
-
Mr. Robot becomes reality: Stop trusting your monitor
When someone is taken aback by something that is hard to believe, they often say, “You can’t believe your eyes.” Hackers exploiting security flaws in monitors, on the other hand, make this adage actually accurate.
-
Raccoon Stealer Abuses Telegram Infrastructure to Store C&C Addresses
By 2020, Racoon Stealer has become one of the most affordable data theft software.
-
Insider Threat Program at NASA
While NASA’s classified systems have a fully working insider threat program, the vast bulk of the agency’s information technology (IT) systems do not.
-
Google Discovers the Initial Access Broker Behind the Conti Ransomware Which Infiltrates Organizations Using Phishing
Google’s Threat Analysis Group (TAG) took the wraps off a new initial access broker that it said is closely affiliated to a Russian cyber crime gang notorious for its Conti and Diavol ransomware operations.
-
The Conflict Between Russia and Ukraine Is Getting Worse
Telegram Has Become a Cyber Criminal’s Digital Forefront
-
Ukraine Assembles an “IT army” to Launch Cyber-attacks on 31 Russian Entities.
The Minister of Digital transformation of Ukraine, Mikhail Fedorov announced the creation of an army of IT specialists.
-
-
-
The Importance of Password Protection Intelligence
Password protection has a number of well-known disadvantages. One of them, though, has gotten remarkably little notice. That’s how and when businesses can find out if their data has been hacked by outsiders.






