Cyber Attacks

Beijing Internal Network Also A Victim Of Ransomware

Beijing is the favorite whipping boy of the Western powers when it comes to being accused of abusing its citizens, causing harm for the rest of the world through its espionage campaigns and maintaining its own army of blackhat elite hackers. However, the reality is China is as vulnerable a country to typical cyber attacks

[ Read More ]

Lack Of Policy Of Least Privilege Causes Cyber Attacks For Organizations

The computer policy of the least privilege is not only an important principle but rather a critical piece of IT security precaution these days. Any organization should practice it, in order to lessen the possibility of unauthorized access or stolen account causing trouble for a system, especially in cloud-based apps and critical IT infrastructures. This

[ Read More ]

Swiss Government Wants its E-Voting System to be ‘Hacked’

Want to earn quick cash? Then accept the invite of the Swiss government, as they are offering $30,000 reward whoever can hack their e-voting system. The pen test challenge are both open for companies, groups and individuals, with the successful party earning $30,000 in cold cash. “The e-voting system is the first Swiss system that

[ Read More ]

Attempted Cyber Attack on Australian Parliament

Australia’s security agencies are investigating a likely cyber-attack attempt on the Federal Parliament’s computer system. It is alleged that the government believes that some foreign government is behind the attack. The hackers were caught in the early stages of gaining access to the system because the authorities didn’t find any loss of data, but signs

[ Read More ]

How to Protect Your Website From a Cyber Attack

Your website is your calling card to attract customers, and an unexpected cyber-attack can cost you both time and money. What types of activity are you monitoring from the back end? With the right tools, your website can increase its security and prevent an attack. To avoid becoming the next victim, it’s time to take

[ Read More ]

Use Security Technology to Improve Business Operations

Security technology would continue to be as important for businesses in 2019 as it was in 2018; in fact, it would be much more important in 2019 than it was in 2018. As we know, security technology today is integral to business operations and contributes greatly to the continuity of any business and its operational

[ Read More ]

How to Protect Mid-Tier Enterprises from Cyberattacks in 2019

The new year has begun; here comes another New Year Special from The Threat Report. Today, we take a look at how mid-tier enterprises can protect themselves from all kinds of cyberattacks- known as well as unknown ones. 2018 saw mid-tier enterprises facing lots of cybersecurity challenges, with hackers seeking to exploit all kinds of

[ Read More ]

How To Minimize The Chance Of Becoming The Next Victim of Cyber Attacks?

The world has breached the very limit of the Internet Protocol version 4 address, AKA IPv4. This addressing scheme enables around 4.3 billion distinct devices to be connected to the Internet at the same time. However, as mentioned by the father of the Internet, Vint Cerf, IPv4 was not designed as a ‘production’ protocol but

[ Read More ]

Is Your Router Being Exploited By Cyber Attackers?

Chances are you have a wifi router in your home that broadcasts an internet signal so your devices, laptops, smartphones, tablets, video game consoles, and whatever else can use it. If you work in an office, chances are you have a router there too. And if you go to your local coffee shop to surf

[ Read More ]

How In The World Did Trickbot Steal Your Bank Password?

First there was Dyre malware, initially discovered in October 2014 and designed to steal sensitive data by successfully infecting computers. Most people conduct online banking using their personal phones, tablets, and PCs, and many others use their credit cards to make purchases online using those same devices. Further, enterprise and business computers as well as

[ Read More ]