Researchers from MalwareHunterTeam have identified a new phishing campaign that is distributing an attachment which installs Netwalker ransomware in the devices.
Subscribe now
Researchers from MalwareHunterTeam have identified a new phishing campaign that is distributing an attachment which installs Netwalker ransomware in the devices.
Considering the seriousness of the COVID-19 situation we at The Cybersecurity Times, wanted to offer some tips to remote workers for improving their cybersecurity.
Considering the COVID-19 situation, software manufacturers have come up with free remote working software to facilitate the productivity and security of business operations. This article will include a list of free software that is being offered for free in the market to make things easy for businesses.
A new ransomware variant called ‘Coronavirus’ is distributed through a bogus website Wisecleaner.best , pretending as if it is recommending device optimization software.
Microsoft has released its patches for the March Patch Tuesday which includes patches for an alarming count of 117 vulnerabilities, making it the biggest Patch Tuesday till date. Out of those 117 vulnerabilities, 26 were marked critical, 88 were mentioned as important, and 3 has been marked as moderate vulnerabilities.
The process of collecting and storing data in a diversified way with a cluster of computers without any authority over it, but equally contributed and owned by everyone is called the Blockchain technology.
Security professionals have identified substantial amount of new threats like booby-trapped URLs, coronavirus themed malware, and credential stuffing manoeuvres.
Remote code execution vulnerability identified in the PPP daemon (pppd) software that comes in Linux operating systems and in other networking devices.
Cities and enterprises in the United States are falling to PwndLocker ransomware which is asking for ransoms around $650,000. This ransomware was first discovered by the end of 2019 and since then it has encrypted number of enterprises and has demanded ransom from $175,000 to$ 650,000 until now.
Ultrasonic waves can be deployed to manipulate voice assistants to interact with the attackers fetch sensitive data, make fraudulent calls, read two-factor authentication codes, and more.
Our vision is to deliver the trending and happening cyber events to the enthusiasts.
We believe in delivering educational and quality content for hassle-free understanding of the subject.
You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.