Cybersecurity

Mitrecorp Issues Fake Vulnerability Bug Report For VLC Player

CERT-Bund has issued a critical advisory regarding an alleged persistent vulnerability in all versions of VLC Player from version 3.0.7.1 and older. VLC Player is a very popular cross platform open source media player with versions available in Windows, Linux, MacOS, iOS, Android and Unix. The bug has something to do with buffer over-read, connected

[ Read More ]

Comprehensive Cybersecurity Plan, A Must For Firms

Cyber ​​attacks are changing with the times. Initially, personal cyber-attacks were nothing but digital vandalism, seeking for 15-minutes of fame were mainstream, but the people behind the attacks today shifted to economic reason why they are into it – for money. They target organizations, important infrastructures, and state agencies, the incidents became increasingly sophisticated, complicated

[ Read More ]

Are Companies Still Doubting Cloud-Computing?

The 2019 Access Management Index report revealed by Thales has provided a quick glimpse of how corporations’ top IT decision makers are coping with cloud-computing push by the industry. 49% of the 1050 IT corporate leaders suggest that they will not embrace cloud computing at this time, due to the issue of becoming a target

[ Read More ]

Fundamentals Of A DDoS Attack

Distributed Denial of Service Attack (DDoS) is a critical cybersecurity concern that causes a service to stop by sending numerous processing requests from multiple computers to a target server over the network. DDoS basically is an expansion of the DoS attack, when multiple computers make simultaneously request service from a certain target in an effort

[ Read More ]

Myths In Cybersecurity That People Needs To Forget

Cyber attacks come in various presentation and packages, the damage range from “all systems feel normal” to “the sky is falling” scenarios. But one thing is for sure, users of all access levels, from system admins to end-users and consumers have a large role to play for the success or failure of cyber attacks perpetuated.

[ Read More ]

BEC Scams, A Profitable Phishing Technique

Only a few groups in the cybersecurity industry know or even heard the name “Scattered Canary”, it is considered as a “cyber-gang” with at least a dozen members set to issue targeted BEC (Business Email Compromise) campaigns. Scattered Canary started its operations more than ten years ago, with only a few members, the team targeted

[ Read More ]

Drone Technology a Rising Threat to Cybersecurity

Drones have become immensely popular all across the world and today drones can be bought and flown by anyone. People use drones for different purposes, ranging from filmmaking and photography to surveillance and agriculture. The trend to use drones for delivering packages and to ship medical samples is also picking up. Well, for any technology,

[ Read More ]

5 Ways In Handling Security Trends of First Quarter 2019

2019’s First Quarter already ended, and as we can see cybersecurity issues are not bound to slow down any time soon. We have provided many embarrassing and sad stories of companies and public sector entities falling for cyber attacks, phishing, malware infection and other issues. We are here to help make our readers aware of

[ Read More ]

Healthcare Institutions And Cyber Security Preparations

The healthcare industry’s market is rapidly expanding as the population ages on a global scale. Therefore, in the medical and pharmaceutical fields, digital transformation is promoted and the way of next-generation healthcare is required. Cost of healthcare increases all the time, therefore, governments should formulate new health and medical strategy fit for their country. All

[ Read More ]

These Are The Emerging Cybersecurity Threats Of 2019

The Cyber Security arms race between hackers and security professionals took another turn in 2018 as the escalation of technology between the two sides continues. According to the Cisco’s 2018 Annual Cybersecurity Report, hackers layered their attacks with new techniques and innovations that challenged the cybersecurity defenses of organizations across the world. According to the

[ Read More ]