Home Tags Cyberattacks

Tag: Cyberattacks

71% of Indian Organizations Attribute Cyberattacks to Vulnerabilities in Technology Deployed...

Cyber Exposure company, Tenable, published a global study that revealed 71% of organizations in India attribute recent business-impacting cyberattacks on the remote workforce due...

Singapore Businesses Struggling to Cope with Network and Ransomware Attacks

While Singapore is accelerating its digital transformation capabilities, cybersecurity standards remain a severe concern for organizations in the country. New research from Barracuda Networks...

Hardening Cyber Insurance Market Makes Cybersecurity More than a Tech Problem

The hardening of the cyber insurance market is forcing enterprises to come to terms with the impact their cybersecurity posture has on the bottom...

Malware and Vulnerability Trends Report: High-risk Vulnerabilities in Corporate Software Frequently...

Since devices are connected to the internet more than ever before, exploiting vulnerabilities to cross privilege boundaries has become common. Recently, Recorded Future and...

Hackers Target Microsoft Office Users in a New Zero-Day Attack

Researchers uncovered active exploitation of a zero-day remote code execution vulnerability in the main HTML component of the now-discontinued Internet Explorer browser. Microsoft warned...

Beware! Hackers Found Exploiting Proxyware to Sell Users’ Internet Connection

It’s common for threat actors to leverage a variety of new malicious techniques for financial gain. Recently, security experts from Cisco Talos uncovered a...

“Zero-trust is not a product or solution that can be installed”

Under the prevailing circumstances of the pandemic, IT assets are no longer present behind the safe confines of corporate firewalls. Rather, they are dispersed...

How to Protect Your Credit Card Data Online

Sensitive financial data remains a primary target for cybercriminals. Adversaries often target sensitive financial data such as credit/debit card numbers, CVV, and other bank...

Email Threats Continue to be Gateway of Major Cyberattacks

Cyberattacks via unsolicited emails remain an effective attack vector as threat actors continue to evolve their phishing techniques. Adversaries are quick to adopt new...

Attackers Use Fake FMWhatsapp to Spread Triada Trojan

From data privacy violations to fake applications, WhatsApp has been in the news for various reasons since the beginning of 2021. The popular instant...

MOST POPULAR

RECENT POSTS