We saw how Microsoft’s expressed relief headache ended as they released this statement “we fixed this vulnerability two months ago! If you all updated your security settings in Windows this wouldn’t be a problem! Last Friday this ransomware called ”…
Cloud security is the order of the day, the trend and the need of our times. Enterprises today spend much on cloud antivirus and cloud security, but with many enterprises finding the right balance between cloud security and traditional IT…
A significant number of today’s malware attacks are through zero-day exploits. The reason – many enterprises do not have the resources to identify zero-day exploit attacks. Relying on their legacy antivirus solution for their system security program, many do believe…
Security experts and researchers have recently observed certain malware attacks targeting IoT devices that lead to the wiping of data from the infected systems/devices. Based on a couple of attacks that happened recently, it’s inferred that hackers are adding data-wiping…
Here’s a look at the six most critical application security risks that anyone could encounter today, in the age of aggressive cyber threats, malware attacks, virus protection tool etc… Let’s begin with security configuration related issues… Well, this is…
A new form of Microsoft Word macro-based malware has been discovered by cyber security researchers. This malware can affect both Windows and MacOS systems but follows different methods of attack for each operating system. The malicious macro is built-up…
Here comes news about a new kind of attack that can turn an advanced antivirus security software itself into malware. Researchers have come up with reports about a new proof-of-concept exploit, which has been named DoubleAgent, which would hijack third-party…
We have had, in the recent months, many reports of malicious email attacks, including those targeting Amazon and Netflix customers. Such malicious email attacks are on the rise; still it seems that even today there are many people, and many…
Nowadays, cybercriminals seem to prefer Fileless Malware Attacks on organizations. Most malware attacks can be detected, blocked and removed using malware removal tools or applications. However, Fileless Malware Attacks are non-malware attacks that utilize legitimate existing programs and applications and…
GOOGLE has found that the Windows 10 Edge and Internet Explorer 11 has now been exposed to a severe web security vulnerability that aids the hackers to strike the browsers while they can execute malware code from remote and gain…