Image: ZDNet A web hosting company named No Support Linux Hosting announced today it was shutting down after a hacker breached its internal systems and…
Tag: admin
Website Security for Small Business: Everything You Need to Know – Business 2 Community
There was a time when only large corporations and government agencies had to worry about hackers and cybercriminals. Not anymore. They now pose an ever-increasing…
Zero-day payload found in Lazarus social-engineering campaign. Ransomware in Electronuclear admin systems. Russo-US relations. – The CyberWire
In an update to the Lazarus Group’s social engineering campaign against vulnerability researchers, BleepingComputer reports that security firm ENKI has found MHTML files that Lazarus…
CSO’s guide to the worst and most notable ransomware
Ransomware has a long history, dating back to the late 1980s. Today, it’s generating billions of dollars in revenue for the criminal groups behind it.…
Microsoft Is Seeing A Big Spike In Web Shell Use
Security personnel at Microsoft are seeing a big increase in the use of Web shells, the light-weight programs that hackers install so they can burrow…
A Roadmap to Blue Team Security Certifications in 2021 – EC-Council Blog – EC-Council Blog
Cybersecurity, since its inception, has always worked on a defensive and offensive approach. The Red Team takes offensive measures to counter an attack, while the…
Indian Crypto Exchange Buyucoin Hacked, Sensitive Data of 325K Users Reportedly Leaked – Exchanges – Bitcoin News
Indian cryptocurrency exchange Buyucoin has reportedly been hacked and sensitive data of about 325,000 users has reportedly been leaked onto the dark web. According to…
Parler Was Hacked on WordPress, The Internet’s Biggest Platform. Is Everyone At Risk? – Observer
Parler, the Twitter rip-off that served as one of the main organizing tools for the Donald Trump fanatics who stormed the U.S. Capitol on Jan. 6,…
NSA warns hackers are forging cloud authentication information – Security Magazine
This advisory specifically discusses detection and mitigation of two TTPs to forge authentications and gain access to a victim’s cloud resources. While these TTPs require…
4 Experts Share Advice on Network Security in 2021 – Solutions Review
As part of our Networks Insight Jam, we got in touch with several experts and asked for their advice and predictions for network security in…