Latest Security News

The Corporate Risks Of Allowing Undocumented Devices

Accessibility and commoditization of computing devices brought both advantages and disadvantages for the public. The smart devices became much more affordable, while manufacturers are motivated to release new devices faster than the market can actually afford. Enterprises are very much affected by these dynamics, given that they have allowed BYOD (Bring Your Own Devices) within

[ Read More ]

Hacking Preventive Ways To Keep Gnosticplayers at Bay

Hackergroup Gnosticplayers had done it again, their recent successful campaigns against 8 websites, namely: Strong Kingdoms, petflow, YouNow, Houzz, Roll20, ixigo, and Ge.tt. These attacks created a huge supply of user credentials that are now available for sale in the Dark Web. At a recent estimate, around 126 million accounts are being offered to Dark

[ Read More ]

Penetration Testing Tool Yuki-Chan for Threat Protection

We are recommending for quite a while for companies serious with their IT security to subject itself to a thorough penetration testing. Pen test can be done internally by knowledgeable IT staff, or the company can hire an external pen testing team. Members of pen test teams are passionable when it comes to detecting weaknesses

[ Read More ]

Facebook Blocks 1.2 Million Videos About The NZ’s Mosque Terror Attack

The recent attacks against mosques in Christchurch, New Zealand captures the attention of the world. Copies of the video footage of the actual event were spreading like wildfire in social media. The terrorists themselves launched a live video of the shooting incident that killed at least 50 people from two mosques. According to the New

[ Read More ]

SandCat And FruityArmor Campaigns Took Advantage Of Zero-Day Flow

Critical vulnerability under CVE-2019-0797 has been recently patched by Microsoft in order to lessen the chances of two Advanced Persistent Threat groups, SandCat, and FruityArmor from taking advantage of it. The former zero-day exploit was being exploited by the two groups extensively, with many of their victims unaware of it. This is given since only

[ Read More ]

Microsoft To Roll Back Updates Which Cause Failed Boot

When Windows 10 was first introduced in 2015, the roll-out was not smooth sailing, but instead became a center of controversy for an operating system released by Redmond. It was accused of being an information collection tool for Microsoft, forced obsolescence of older version of Windows since DirectX 12 API is a Windows 10 exclusive

[ Read More ]

Australia VS Huawei Devices Storyline Never Die

The political propaganda against Huawei devices continues in the land down under, as the Australian Foreign Minister Marise Payne has ruled that the ban against Huawei’s 5G devices will continue to be implemented by the federal government. “We have taken the strongest advice from intelligence agencies in this country, the strongest technical advice as to

[ Read More ]

M-Trends 2019 Reports Shows “Persistence” Of The State-controlled Hacker Teams

FireEye, a mainstream cybersecurity consulting firm, has released their yearly M-Trends report, the 2019 edition features the malware trends for 2018 which will help shape the direction of the antivirus industry for the current year. If it can be summarized into just 1-word, that word is “persistence.” Threat actors, including that backed-up by nation-states, are

[ Read More ]

SHAREit App’s Vulnerability, Publicly Disclosed

It is very important security-wise that app updates be applied as soon as they become available, regardless of platform. Recently a critical vulnerability has been discovered in the popular cross-platform app, SHAREit. With a global user-base of around 1.5 billion users, and versions for MacOS, Windows, iOS, and Android, a flaw in the app affects

[ Read More ]

DDoS-For-Hire Suspect in Chicago, Pleaded Guilty

Threat actors, for all intents and purposes, are wise individuals. They have advanced minds and they always try to be a step ahead when it comes to covering their tracks before authorities and investigators complete the puzzle. Unfortunately, for some of them, they have not yet reached the art of cover-up as they leave their

[ Read More ]