Latest Security News

Oracle WebLogic Servers Hit With Zero-Day Attack

Oracle WebLogic Servers are not the usual targets when it comes to cyber attacks. Besides, the service is a niche and is facing strong competition from the likes of Amazon with their AWS and Google with its fleet of web services. This time, a new ransomware variant named Sodinokibi has penetrated WebLogic Servers using a

[ Read More ]

At What Level An AntiMalware Product Is Still Effective?

New cybercrime techniques aimed at PCs and mobile devices are emerging every day, and it seems that the use of integrated security software that provides multi-layered defense measures is a shortcut for strengthening countermeasures. Or that is what the antivirus vendors would like everyone believe. Who are involved with cybercrimes: Persons who seek information on

[ Read More ]

Is China Racial-Profiling Its Minority?

Mainland China has already started its massive facial database of all mainland Chinese citizens and possibly permanent residents of the country as well. Beijing is keen on monitoring the movements of people in the mainland. This is the key to transform China into a cohesive unit, with the opposition to the ruling leaders in Beijing

[ Read More ]

Is Infrastructure-As-A-Service The Future Of Corporate Computing?

Ask any system administrator today, and we will hear from them that attempts from unknown outside parties infiltrating their systems are happening on a daily basis. Yes, guys welcome to the 21st-century corporate computing era. We live in a world where cyber warfare is raging globally, between nations, between firms and between groups and individuals.

[ Read More ]

VPN Apps Not Working As Intended, Exposed

As an IT professional for decades, we are always highlighting the importance of VPN when it comes to maintaining security and privacy. It is the most cost-effective way to isolate a connection from prying eyes, a VPN creates a secure virtual pipe from the user’s origin device to the VPN vendor’s exit node, wherever it

[ Read More ]

Hackers Can Use Unused Internet Explorer to Steal Data

This is no less than a shocker…Hackers can now use Internet Explorer to steal your data, that too even if you never use it. A security researcher has detected a zero-day vulnerability in Internet Explorer which would allow hackers to steal data. Security researcher John Page has published details and proof-of-concept code for the zero-day

[ Read More ]

Apache Critical Vulnerability Discovered, Update Available For Download

Apache, the top web server platform the Internet as a critical vulnerability which is recently patched by Apache Foundation. Everyone that Apache needs to immediately install the patched version of Apache in order to close the vulnerability which is now known as CVE-2019-0211. As per the report affected versions range from 2.4.17 to 2.4.38, the

[ Read More ]

The Corporate Risks Of Allowing Undocumented Devices

Accessibility and commoditization of computing devices brought both advantages and disadvantages for the public. The smart devices became much more affordable, while manufacturers are motivated to release new devices faster than the market can actually afford. Enterprises are very much affected by these dynamics, given that they have allowed BYOD (Bring Your Own Devices) within

[ Read More ]

Hacking Preventive Ways To Keep Gnosticplayers at Bay

Hackergroup Gnosticplayers had done it again, their recent successful campaigns against 8 websites, namely: Strong Kingdoms, petflow, YouNow, Houzz, Roll20, ixigo, and Ge.tt. These attacks created a huge supply of user credentials that are now available for sale in the Dark Web. At a recent estimate, around 126 million accounts are being offered to Dark

[ Read More ]

Penetration Testing Tool Yuki-Chan for Threat Protection

We are recommending for quite a while for companies serious with their IT security to subject itself to a thorough penetration testing. Pen test can be done internally by knowledgeable IT staff, or the company can hire an external pen testing team. Members of pen test teams are passionable when it comes to detecting weaknesses

[ Read More ]