William Marshal

Netwalker Ransomware is being dispersed using phishing hoaxes

Researchers from MalwareHunterTeam have identified a new phishing campaign that is distributing an attachment which installs Netwalker ransomware in the…

5 years ago

10 cybersecurity tips to fortify your devices while working from home

Considering the seriousness of the COVID-19 situation we at The Cybersecurity Times, wanted to offer some tips to remote workers…

5 years ago

Top 7 software vendors facilitating ‘Work from Home’ during COVID-19 pandemic

Considering the COVID-19 situation, software manufacturers have come up with free remote working software to facilitate the productivity and security…

5 years ago

Coronavirus ransomware encrypts devices to secretly allow Kpot steal credentials

A new ransomware variant called 'Coronavirus' is distributed through a bogus website Wisecleaner.best , pretending as if it is recommending…

5 years ago

Microsoft Patch Tuesday March 2020 release patches for 117 vulnerabilities

Microsoft has released its patches for the March Patch Tuesday which includes patches for an alarming count of 117 vulnerabilities,…

5 years ago

What is Blockchain Technology?

The process of collecting and storing data in a diversified way with a cluster of computers without any authority over…

5 years ago

Coronavirus themed cyberattacks continues to evolve: Malware and Booby-trapped URLs

Security professionals have identified substantial amount of new threats like booby-trapped URLs, coronavirus themed malware, and credential stuffing manoeuvres.

5 years ago

Remote code execution in PPP Daemon (CVE-2020-8597) could become the gateway for attackers

Remote code execution vulnerability identified in the PPP daemon (pppd) software that comes in Linux operating systems and in other…

5 years ago

American enterprises are becoming victim to PwndLocker ransomware

Cities and enterprises in the United States are falling to PwndLocker ransomware which is asking for ransoms around $650,000. This…

5 years ago

Surfing attack manipulates voice assistant devices to extract information

Ultrasonic waves can be deployed to manipulate voice assistants to interact with the attackers fetch sensitive data, make fraudulent calls,…

5 years ago