Back
Showing 1-33 of 33 results

Zero-Day Bugs Must be Reported to Government Within 2 Days of Discovery – New Chinese IT Law

July 22, 2021
0

A new rule has been passed by the Chinese government, that claims that every cybersecurity experts have to report any kind of Zero-Day vulnerability they found in software within 2 days to the government. However, the experts have no right to sell that information, without any prior consent of the government. The “Regulations on the Management of Network Product Security Vulnerabilities” have issued this new rule and …

10 Mobile App Security Scanners to Detect Vulnerability in Applications 2021

July 22, 2021
0

In this era, mobile technology and smartphone both are trendy terms that often get used. 90% of the population holds the smartphone in their hands. Their purpose is not only to “call” other parties but to use other features like Bluetooth, camera, Wi-Fi, GPS, and many other applications. Mobile app security scanners play an important role to detect vulnerability. When you test the software application …

Data breach at third-party provider exposes medical information of US healthcare patients

July 22, 2021
0

A data breach at a third-party provider has potentially exposed the private medical information of patients at Northwestern Memorial HealthCare (NMHC) providers. Unknown actors gained unauthorized access to a databaseowned by Elekta, which provides a cloud-based platform that handles legally-required cancer reporting to the State of Illinois. In a security advisory, the healthcare provider, based in Chicago, said that the attackers made a copy of the datasets, which include …

REvil infrastructure disappearance sparks speculation about fate of infamous ransomware slingers

July 22, 2021
0

Ransomware groups periodically disappear, only to reinvent themselves under new branding. Other possibilities include interdiction by law enforcement – US authorities have shown themselves more willing to actively dismantle cybercrime infrastructure of late – or even interference from rival cybercrime gangs. Laying low? The Sodinokibi ransomware, widely attributed to the REvil gang and distributed by affiliates through a Ransomware-as-a-Service (RaaS) business model, has been a scourge of corporate security over the last …

AI And Its Potential For Cybersecurity

December 21, 2020
0

In an increasingly digitized world, security in the virtual realm becomes more and more of a pressing issue. Especially with the pandemic accelerating the transition of everyday commitments and operations toward the digital realm, the issue of maximum security and safety becomes even more acute. Suddenly, a lot more is at stake in the face of growing cyberattack risks, and there is a dire need for …

A wake-up for the world on cyber security

December 21, 2020
0

Imagine intruders break into your home and loiter undetected for months, spying on you and deciding which contents to steal. This in essence is the kind of access that hackers, assumed to be Russian, achieved in recent months at US government institutions including the Treasury and departments of commerce and homeland security, and potentially many US companies. If the fear in the Cold War was …

Cybersecurity attack: 5 things you can do right now to protect yourself

December 21, 2020
0

Individual Americans don’t need to worry – at least not immediately – that their personal information was rifled through or stolen in the recently discovered intrusion into U.S. computer systems that officials suspect was the work of Russian hackers, cybersecurity experts say. But it’s unclear what the hackers could do in the future. So the cyber attacks are an important reminder that all systems – including those we …