Archive for the ‘cybersecurity’ Category

Unveiled: How xHelper Android Malware Re-Installs Even After Factory Reset

April 7th, 2020
Remember xHelper? A mysterious piece of Android malware that re-installs itself on infected devices even after users delete it or factory reset their devices—making it nearly impossible to remove. xHelper reportedly infected over 45,000 devices last year, and since then, cybersecurity researchers have been trying to unfold how the malware survives factory reset and how it infected so many

Posted in Android firmware, Android Malware, Android protection, Android ROM, Android Security, cybersecurity, xhelper | Comments (0)

Zoom Caught in Cybersecurity Debate — Here’s Everything You Need To Know

April 6th, 2020
Over the past few weeks, the use of Zoom video conferencing software has exploded ever since it emerged the platform of choice to host everything from cabinet meetings to yoga classes amidst the ongoing coronavirus outbreak and work from home became the new normal. The app has skyrocketed to 200 million daily users from an average of 10 million in December — along with a 535 percent increase

Posted in Apple software, best privacy tools, computer security, computer security conference, cybersecurity, Privacy, Video Conferencing Software, windows software, zoom | Comments (0)

Webinar — Autonomous Breach Protection: The New Security Paradigm Shift

April 1st, 2020
Organizations today struggle with multi-product security stacks, that are expensive to purchase and maintain and also require a highly skilled security team to manually integrate and operate. The current Coronavirus crisis that has imposed a strict quarantine on organizations and security teams highlights the inherent weakness in relying on manual operation. This gives rise to a new security

Posted in Autonomous Breach Protection, cybersecurity, Cynet, Security Operation Centers | Comments (0)

AppTrana Offers Protection to Online Businesses During Coronavirus Outbreak

March 30th, 2020
These are unprecedented times, and everyone is going through a testing period, with more than 3 billion people locked down all over the world. Businesses are scrambling to stay afloat and are forced to move digital in a very short span of time without much preparation. As these businesses move digital, cyber threats are more real than ever. Every day we are hearing news about hackers taking

Posted in coronavirus, cybersecurity, web application firewall, Web Application Security, website security | Comments (0)

COVID-19: Hackers Begin Exploiting Zoom’s Overnight Success to Spread Malware

March 30th, 2020
As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake "Zoom" domains and malicious "Zoom" executable files in an attempt to trick people into downloading malware on their devices. According to a report published by Check

Posted in coronavirus, COVID-19, cybersecurity, domain hosting, domain name, malware, phishing attack, remote access tool, Video Conferencing Software, zoom | Comments (0)

Critical RCE Bug Affects Millions of OpenWrt-based Network Devices

March 24th, 2020
A cybersecurity researcher today disclosed technical details and proof-of-concept of a critical remote code execution vulnerability affecting OpenWrt, a widely used Linux-based operating system for routers, residential gateways, and other embedded devices that route network traffic. Tracked as CVE-2020-7982, the vulnerability resides in the OPKG package manager of OpenWrt that exists in the

Posted in cybersecurity, hacking news, HTTP, network security, openwrt, Router Security, Vulnerability | Comments (0)

How to Provide Remote Incident Response During the Coronavirus Times

March 24th, 2020
While the Coronavirus pandemic continues to strike chaos across the global economies, threat actors keep on launching cyberattacks on organizations from all sizes and verticals. IR providers face a unique challenge when approached by these organizations since, due to the Coronavirus mass quarantine, conducting incident response engagements by arriving physically to the customers' offices is

Posted in cybersecurity, Cynet, Cynet incident response, endpoint detection, endpoint security, Enterprise Security, hacking tool, incident response, incident response tool | Comments (0)

Use This Ultimate Template to Plan and Monitor Your Cybersecurity Budgets

March 11th, 2020
Sound security budget planning and execution are essential for CIO's/CISO's success. Now, for the first time, the Ultimate Security Budget Plan and Track Excel template (download here) provide security executives a clear and intuitive tool to keep track of planned vs. actual spend, ensuring that security needs are addressed while maintaining the budgetary frame. The dynamic nature of the

Posted in cyber security, cybersecurity, cybersecurity budgets | Comments (0)

Ex-CIA Accused of Leaking Secret Hacking Tools to WikiLeaks Gets Mistrial

March 9th, 2020
A federal judge in New York on Monday declared a mistrial in the case of a former CIA software engineer who was accused of stealing a massive trove of the agency's classified hacking and tools and leaking it to WikiLeaks whistleblower website. While the jury was unable to reach a verdict on eight counts of the theft and transmission of CIA's confidential documents, it did find ex-CIA Joshua

Posted in CIA Hacker, CIA Hacking Tools, cybersecurity, Joshua Adam Schulte, Joshua Schulte, Vault 7, WikiLeaks | Comments (0)

Hackers Compromise T-Mobile Employee’ Email Accounts and Steal User’ Data

March 5th, 2020
If you are a T-Mobile customer, this news may concern you. US-based telecom giant T-Mobile has suffered yet another data breach incident that recently exposed personal and accounts information of both its employees and customers to unknown hackers. What happened? In a breach notification posted on its website, T-Mobile today said its cybersecurity team recently discovered a sophisticated

Posted in cybersecurity, data breach, data leaked, data security, hacking news, t-mobile, T-Mobile hack, Telecom company, Telecom hacking | Comments (0)