Skip to content
securitysifu

SecuritySifu

CyberSecurity And Emerging Technology
securitysifu
  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds
  • Feeds

    ADT Tech Hacks Home-Security Cameras to Spy on Women – Threatpost

    The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can…

    28/01/2021 No Comments
    View More
  • Feeds

    The SolarWinds Hack Can Directly Affect Control Systems – Lawfare

    Much of the initial discourse around the SolarWinds cyberattack focused on its impact on the affected information technology (IT) systems. However, this overlooks an equally…

    28/01/2021 No Comments
    View More
  • Feeds

    IOTW: Another Solarigate Target Identified by Microsoft – Cyber Security Hub

    Mimecast is the latest to be added to the list of corporations affected by the SolarWinds hacks, now being dubbed Solarigate. Facts During Microsoft’s investigation…

    28/01/2021 No Comments
    View More
  • Feeds

    A Day in the Life of a Security Operations Center Analyst | EC-Council – EC-Council Blog

    In today’s world of increasing cybercrime and data breaches, every organization needs to place an emphasis on securing its technological assets. This is where the…

    27/01/2021 No Comments
    View More
  • Feeds

    401(k) Accounts Vulnerable to Cybersecurity Breach – The National Law Review

    Thursday, January 21, 2021 In this episode of the Proskauer Benefits Brief, partner Robert Projansky and special guest Garrett Fenton, senior attorney at Microsoft Corporation, discuss cyber…

    27/01/2021 No Comments
    View More

Terrifying Camera App Flaw Left Millions of Android Phones Vulnerable to Spying
Mobile Security

Terrifying Camera App Flaw Left Millions of Android Phones Vulnerable to Spying

22/11/2019 No Comments androidattackcameragooglespyvulnerability

Even if you’re diligent about app permissions, sometimes you just can’t predict how or when a bad actor will abuse them. This time around, a…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Terrifying Camera App Flaw Left Millions of Android Phones Vulnerable to Spying
Phineas Fisher Offers $100,000 Bounty To Hack Banks And Oil Companies
Security

Phineas Fisher Offers $100,000 Bounty To Hack Banks And Oil Companies

19/11/2019 No Comments bugbug bountycryptocurrencycybercrimeemailhacktivismhacktivistvpnvulnerability

An infamous vigilante hacker known for their hits on surveillance companies is launching a new kind of bug bounty to reward hacktivists who do public…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Phineas Fisher Offers $100,000 Bounty To Hack Banks And Oil Companies
Ransomware: Still Going Strong 30 Years On
Security

Ransomware: Still Going Strong 30 Years On

19/11/2019 No Comments cryptojackingddosmalwareransomwaretrojan

Next month marks the 30th anniversary of the first-ever ransomware attack, and according to new research, this particular form of malware is still going strong.…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Ransomware: Still Going Strong 30 Years On
DDoS Kingpin Gets 13 Months, Massive Fine
Security

DDoS Kingpin Gets 13 Months, Massive Fine

18/11/2019 No Comments attackddosnetwork

A US court has sentenced the operator of a massive DDoS service to 13 months in prison. Sergiy Usatyuk, 21, from Orland Park, IL was…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More DDoS Kingpin Gets 13 Months, Massive Fine
Thousands Of Hacked Disney+ Accounts Are Already For Sale
Security

Thousands Of Hacked Disney+ Accounts Are Already For Sale

18/11/2019 No Comments credentialshackpassword

Hackers didn’t waste any time and have started hijacking Disney+ user accounts hours after the service launched. Many of these accounts are now being offered…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Thousands Of Hacked Disney+ Accounts Are Already For Sale
Chrome, Edge, Safari hacked at elite Chinese hacking contest
Security

Chrome, Edge, Safari hacked at elite Chinese hacking contest

18/11/2019 No Comments applegooglehackmicrosoftpatchsoftwarevmwarevulnerabilityzero day

China’s top hackers have gathered this weekend in the city of Chengdu to compete in the Tianfu Cup, the country’s top hacking competition. Over the…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Chrome, Edge, Safari hacked at elite Chinese hacking contest
‘Unknown Fund’ to Donate $75M in Bitcoin to Crypto, Anonymity-Focused Startups
Blockchain

‘Unknown Fund’ to Donate $75M in Bitcoin to Crypto, Anonymity-Focused Startups

15/11/2019 No Comments anonymityanonymouspersonal informationpii

An anonymous organization dubbed “Unknown Fund” is planning to give away $75 million in Bitcoin (BTC) to startups that are focused on anonymity and the…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More ‘Unknown Fund’ to Donate $75M in Bitcoin to Crypto, Anonymity-Focused Startups
Facebook bug shows camera activated in background during app use
Security

Facebook bug shows camera activated in background during app use

15/11/2019 No Comments androidbugfacebookiosprivacy

When you’re scrolling through Facebook’s app, the social network could be using your camera, concerned users have found. Multiple people have found and reported that their iPhone cameras were…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Facebook bug shows camera activated in background during app use
Dark Web Drug Dealer Pleads Guilty To Using Cryptocurrency to Launder More Than $19 Million
DarkNet

Dark Web Drug Dealer Pleads Guilty To Using Cryptocurrency to Launder More Than $19 Million

14/11/2019 No Comments bitcoincryptocurrencydarkweblawlegal

Hugh Brian Haney pled guilty in Manhattan federal court last week to money laundering charges, based on the proceeds of a narcotics trafficking operation that…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More Dark Web Drug Dealer Pleads Guilty To Using Cryptocurrency to Launder More Than $19 Million
How firewall automation can help prevent breaches caused by wrong configurations
Cloud Security

How firewall automation can help prevent breaches caused by wrong configurations

13/11/2019 No Comments attackbreachdevopsdevsecopsfirewall

A majority of IT staffers polled by firewall management service FireMon said they still use manual processes to manage changes. Firewalls are a critical form…

Share this:

  • Tweet
  • WhatsApp
  • Telegram
  • Email
View More How firewall automation can help prevent breaches caused by wrong configurations

Posts navigation

Previous page Page 1 … Page 84 Page 85 Page 86 … Page 88 Next page

RSS Feeds

  • Cyber security experts say criminals targeting people looking for COVID-19 vaccine information
  • Kaspersky names new Asia-Pacific boss
  • NSW Health, SBS probe potential cyber attack damage
  • Challenges of Risk Management Framework for cyber security and trusted computing in embedded ...
  • Microsoft CEO Satya Nadella: There is 'a big crisis right now' for cybersecurity
  • Attivo Networks Excellence Awards Honor Partners Driving Cybersecurity Innovation Across North ...
  • New cyber security initiative launched in Haliburton County
  • Biden campaign security chief becomes Federal CISO
  • How Biden's $10.2B Investment Can Transform Federal Cybersecurity Post-SolarWinds
  • Trustifi Advances Email Security with Improved Sensitivity Detection, Retroactive Email Scans, and ...

Recent Vulnerabilities

ADT Tech Hacks Home-Security Cameras to Spy on Women – Threatpost

28/01/2021 No Comments
What can you do about the 'unfixable' exploit affecting almost every iPhone and iPad?

What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?

03/10/2019 No Comments
Nearly 60% of businesses suffered a data breach in the past 3 years

Nearly 60% of businesses suffered a data breach in the past 3 years

03/10/2019 No Comments
Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

Researchers Say They Uncovered Uzbekistan Hacking Operations Due To Spectacularly Bad OPSEC

04/10/2019 No Comments
APAC firms will need AI as speed increasingly critical in cyberdefence

APAC firms will need AI as speed increasingly critical in cyberdefence

07/10/2019 No Comments
No comments found.
0day 2fa 4g abuse access control account admin adware aerospace agile ai amazon analytics android anonymity anonymous antivirus api app apple application security appsec apt art artificial intelligence assessment atm attachment attack audit authentication automation autonomous vehicles autopilot aws azure backdoor backup bcp bgp big data biometric bitcoin block blockchain blue team bluekeep bluetooth bot botnet breach breached browser brute force bug bug bounty business business continuity business impact byod camera capsule network cars casino censor cert certificate china chipset chrome cia cio cisco ciso click fraud cloud cnc code code signing compliance container cookie corona covid-19 crack credential stuffing credentials credit card crime critical infrastructure crypto cryptocurrency cryptography cryptojacking cryptomining currency cve cvss cyber cyber attack cyber defense cyber espionage cyber insurance cyber resilience cyberattack cybercrime cybersecurity cyberthreat cyberwarfare cylance darknet darkweb data data breach data leak database ddos debug decryption deepfake deepweb defcon detection devops devsecops diabetes dictionary attack digital digital forensics digital signature disaster recovery diy dkim dmarc dns docker domain doos dos dr e-commerce ecommerce edge computing email emotet encryption encryption keys enigma equifax espionage eternalblue ethereum european union exif exploit extortion facebook facial recognition fake fbi fileless firefox firewall forensics framework fraud ftp fuzzing gdpr git github gmail goldbrute google governance gps grc hack hacked hacker hacktivism hacktivist hash hijack hipaa honeypot hosting hsm https huawei hybrid cloud iam ibm ics identity incident incident handling incident management incident response india industrial control system information security infrastructure injection insider threat instagram insurance intel intelligence internet ioc ios iot ip ipad iphone isms iso iso 27001 iso27000 isp jailbreak kasperksy Kaspersky key keylogger kgb kubernetes law lawsuit leak legal libra linux lock lte mac machine learning malvertising malware managed security medical devices meltdown mfa microprocessor microsoft military mimikatz mirai misconfiguration mitm mitre mobile mobile app mongodb monitor mozilla mssp multi cloud music nasa netcat network nfc nosql notepad notpetya nsa office open source openssl operating system owasp password patch payment pdf penetration test personal information pgp phishing phone php pii pin plugin policy ponzi porn power grid powershell privacy private keys privilege access program programmer protection proxy python quantum ransomware raspberry pi rat rce rdp red team remote code execution response risk router rsa russia s3 saas satellite scada scam script security security awareness self driving car server serverless sextortion sha shell side channel skim smart city smart device smart home smart tv smartphone sms sniff soc social engineering social media software spam spear phishing spectre spf spoof spy spyware sql sqlite ssh ssl standard startup steganography storage stuxnet supply chain surveillance tcp teamviewer telegram tesla testing threat tls token tor trend trojan unix usa usb video virus vmware voice voip vpn vulnerability waf wannacry web website whatsapp whitehat wi-fi wifi wikileaks windows wipro wireless wordpress worm xss yubikey zero day zero trust zoom

Recent Posts

  • ADT Tech Hacks Home-Security Cameras to Spy on Women – Threatpost
  • The SolarWinds Hack Can Directly Affect Control Systems – Lawfare
  • IOTW: Another Solarigate Target Identified by Microsoft – Cyber Security Hub
  • A Day in the Life of a Security Operations Center Analyst | EC-Council – EC-Council Blog
  • 401(k) Accounts Vulnerable to Cybersecurity Breach – The National Law Review

Trending

teamviewer hipaa intel microsoft china big data 2fa code signing virus art network bgp cia smart home dos porn cio steganography gmail diabetes
Follow Us

Search…

  • Home
  • Security
  • Artificial Intelligence
  • IoT
  • Blockchain
  • Cloud
  • Mobile
  • DarkNet
  • Feeds
SecuritySifu | © Copyright All right reserved
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.