Mac security

Moses staff hacker group using new StrifeWater RAT for ransomware attacks

A hacker group called Moses Staff is incorporating an undocumented Remote Access Trojan (RAT) that disguises as a Windows Calculator…

3 years ago

SureMDM security vulnerabilities can lead to Supply Chain Attacks

Multiple security vulnerabilities have been disclosed in 42 Gears SureMDM solution. It is a mobile device management solution that can…

3 years ago

Graphic Card Fingerprinting is manipulated to track user’s activity on the web

A new fingerprinting technique is exploiting a device's graphics processing unit (GPU) that can track users activity on the web…

3 years ago

Court orders websites to stop embedding Google Fonts for GDPR violation

A German Court from Munich has ordered a website owner to pay a penalty of €100 for migrating personal data…

3 years ago

What is COBIT framework – Principles and Components

A framework that is used for developing, implementing, monitoring, and improving IT governance is called as COBIT (Control Objectives for…

3 years ago

More than 20,000 data centers and ILO are exposed to threat actors

Security researchers at Cyble have identified more than 20,000 instances of data centers that are exposed publicly and could cause…

3 years ago

New initiative to secure US water-systems against Cyberattacks

The United States under Biden's command will initiate a new agenda to protect the country's water sector against cyberattacks, which…

3 years ago

What, Why and How of REvil Ransomware Attack

REvil ransomware is a malware that encrypts victims data and asks for a ransom just like any other ransomware. The…

3 years ago

MoonBounce Bootkit targets UEFI hard drives making it irreplaceable

Security researchers from Kaspersky have discovered a novel bootkit that can infect UEFI firmware in a computer. This malware is…

3 years ago

Hackers exploiting SolarWinds Serv-U by leveraging the Log4j vulnerability

Microsoft disclosed details of a new security vulnerability with SolarWinds Serv-U software that is found to be leveraged by threat…

3 years ago