Tag "Cyber Attacker"

Back to homepage
Artificial Intelligence

How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks

The world is going digital at an unprecedentedly fast pace, and the change is only going to go even faster. The digitalization means everything is moving at lightning speed –

Hardware/Network

Electron Framework Vulnerabilities – Shutting the Backdoor

The Electron framework plays an important role in many communication software – Skype, Slack, WhatsApp and GitHub to name just a few. As a cross-platform development tool it offers developers the flexibility

Software

Should You Build Your Infrastructure to be Hit by a Cyber Attack?

There’s a perfect cybersecurity storm happening. We’re seeing more attacks than ever before but there aren’t enough infosec experts out there to defend organizations, meaning that infrastructure and operations teams

Software

Indicators Of Behavior: The New Telemetry To Find Advanced Cyber Attackers

In the world of cybersecurity, the men and women who keep us safe rely on Indicators of Compromise (IOCs): hashes of malware files, URLs, domain names and other artifacts from

Industry Insights

Three cornerstones for effective cyber security

Maritime’s fragmented approach to digitalisation carries risk, especially when it comes to cyber security. Speaking recently at Lloyd’s Register Asia Shipowners’ Forum, Wallem Group chief executive Frank Coles highlighted how

Network Security

“Major Flaw” Discovered in Evernote’s Chrome Extension

A major flaw has been discovered in the code of the Web Clipper Chrome extension of note-taking service Evernote. The flaw, a universal XSS marked CVE-2019-12592 which could have allowed

Industry Insights

Cyber Attackers and IT Admins: Twins Separated at Birth

Conventional wisdom says IT administrators are diametrically different than cyber attackers. A stereotypical hacker is imagined as someone in a hoodie in a dark room using command line tools to

Software

Are your passwords among the 100,000 most breached ones?

Year after year, the list of most often used passwords changes but a little: the latest one, compiled by infosec researcher Troy Hunt and published by the UK National Cyber

Software

Why healthcare is ripe for APT attacks

From healthcare records, hackers enhance the effectiveness of social engineering attacks, involving the impersonation of friends and colleagues. Healthcare records have become one of the most valuable commodities on the

Industry Insights

Industrial Security Limited In Scope

A new Kaspersky Report is out today covering the H2 2018, Threat Landscape for Industrial Automation Systems, that almost one in two industrial systems display evidence of attackers attempting malicious activity –