Linux security

Dridex malware is sending fake termination emails to employees

A phishing campaign is ongoing and deploying a new malware called Dridex. This campaign sends fake employee termination emails so…

3 years ago

What is Cybersecurity and why is it important

Cybersecurity is a process of managing and securing networks, servers, computers, users, mobile devices, applications, and databases from cyberattacks, data…

3 years ago

CISA asks Admins to patch VMware Workspace ONE UEM vulnerability

CISA has requested VMware users to patch a critical vulnerability in the Workspace ONE UEM that cyber criminals could exploit…

3 years ago

Log4j Vulnerability exploiters evolve the attack vector to mine Monero

Cyber criminals are exploiting the Apache Log4j vulnerability and have switched their maneuvers from LDAP callback URLs to RMI or…

3 years ago

Top 5 Password Managers for 2022 – Best Password Management Software

Find out the top 5 password managers for 2022 and see which suits your network requirement better. Choose the best…

3 years ago

LemonDuck malware targets Windows and Linux devices for mining

Microsoft has warned its users about a new crypto mining malware called 'LemonDuck' that is now targeting Windows and Linux…

3 years ago

New phishing campaign drops two payloads in ‘Dali Masks’ threatening device security

security researcher has identified a new phishing campaign that is distributing a LokiBot info-stealing malware and another payload called the…

5 years ago

Vulnerabilities in WordPress LMS plugins will allow attackers to impersonate teachers

Learning management system (LMS) plugins in Wordpress are identified with several vulnerabilities that can be exploited to breach into the…

5 years ago

7 tips to protect your Active Directory while working remotely

IT managers should start with strengthening their AD passwords, employing a secure VPN for all remote access, and also activating…

5 years ago

Now is the time to cover your webcams more than ever

the webcams in smartphones, tablets, laptops and desktops could be hacked without the users' knowledge. Cyber criminals can employ camfecting…

5 years ago