Latest Security News

Machine Learning With Threat Analytics Helps Stop Security Breaches

It is time to bring in some clarity about the gravity of the crimes that are happening today around the world. A common misconception or fiction is that millions of hackers have turned to the dark side and are organizing massive attacks against any vulnerable company. The facts reflect a much more brutal truth that

[ Read More ]

A First Look At Hacking Campaign Vs Exim Servers

The Internet, including both the surface web and the Dark Web is currently being scanned by cybercriminals looking for vulnerable Exim servers, which currently has 57% market share of all existing email servers in the world. The Exim email server flaw documented under CVE-2019-10149 enables hackers to send malformed emails to a target Exim server

[ Read More ]

5 Features Of Android To Aid Pen Testing

We are living in a different world now compared to 10 years ago. Before, the most important thing for a developer to reach is a working-state for his/her application. The program needs to run without crashing, regardless of what video card, amount of memory, processor clock speed and the storage used in the computer where

[ Read More ]

FBI Warns Against TLS-based Phishing Websites

Here in thethreatreport.com, we always emphasize to our readers to always check the address bar of your browser for the “closed padlock” icon before logging-in to your web service accounts, whatever it maybe. The encryption protocol used is practically speaking still unbreakable even with today’s binary supercomputers. However, the age-old yet pretty effective security advice

[ Read More ]

Binding Link Between Cyber Warfare and IT Security

Strong territorial defense alone is not enough to combat today’s risks, as the Internet created another space for people to operate and to move beyond the physical world. Individuals, private companies and the public sector need to maintain a defensive posture when it comes to watching over their network boundaries. Companies, governments and everyone using

[ Read More ]

Apple Services, Is This The Future Of Cupertino?

At the wake of the Huawei ban, which places the second largest smartphone manufacturer with a questionable future, Apple, the former second largest smartphone manufacturer is set to host its World Wide Developer Conference 2019. Through the WWDC, Apple provides the overall direction of their products and services, their relationship with the development community and

[ Read More ]

Why Zombie DDoS Machines Keep Increasing?

The zombie apocalypse theme is a bread-and-butter theme in many sci-fi films and even games. To be overrun by uncontrolled hordes of zombies from all directions, with no place to hide or protect oneself is a very fearful situation. The good thing is that zombies are fiction, isn’t it? Partly incorrect when we talk about

[ Read More ]

5 Things To Do After Installing Windows 10 Build 1903

Redmond has once again blessed (or cursed) the Windows user population with the bi-yearly feature update to Windows 10, 1903. Fresh from the not so good experience of Windows Update, thanks to 1809 that immediately preceded it, build 1903 promises a smooth operating system with a new lick of paint. We have warned our readers

[ Read More ]

Code Execution Vulnerability in Notepad

Tavis Ormandy, a security researcher for Google’s Project Zero division, announced the discovery of a code bug in Notepad, Microsoft’s popular text editor. The problem was privately conveyed to Microsoft, and it was made public after 90 days. No additional information is currently available, because Microsoft has not solved the problem yet. According to sources

[ Read More ]

Inevitable Computing Changes In The Enterprise

We may be witnessing a massive change in the enterprise IT space, fueled by the evolution of personal computing. The days of companies spending a lot of its funding in purchasing physical servers, maintenance, energy and the labor cost of running it 24/7 with regular hardware refresh cycle are fast becoming outdated. Yes, there is

[ Read More ]