Cyber Attacks

K12.com – 7Million Student’s Record Data Breach Exposed

Records show that K12.com, a web-based educational firm has suffered a massive 7-million student records breach due to an insecure version of MongoDB database server. Bob Dianchenko a security researcher at Comparitech has witnessed student data from K12.com was made public on June 25, 2019. According to his discovery, it took K12.com more than a

[ Read More ]

Is Mozilla Stubborn? 17-Year Old Bug, Still Unpatched

Open-source apps have long been hailed for being more secure than proprietary software, for the reason that the availability of the source code means the higher chances that a bug can be seen easier. But this is not consistent, there are times the feature that has a bug for years is not a commonly used

[ Read More ]

Myths In Cybersecurity That People Needs To Forget

Cyber attacks come in various presentation and packages, the damage range from “all systems feel normal” to “the sky is falling” scenarios. But one thing is for sure, users of all access levels, from system admins to end-users and consumers have a large role to play for the success or failure of cyber attacks perpetuated.

[ Read More ]

Ransomware: Less With Consumers, More In The Enterprise

The system admins’ favorite antivirus program Malwarebytes has released the State of Malware Report covering the first quarter of 2019, highlighting the state of malware globally. The highlight of the report is the visible decreasing frequency of global ransomware infections, from 12 million incidents recorded in the first quarter of 2018 to just 4 million

[ Read More ]

Vulnerability Management In The Nutshell

In the process of developing and actually using particular software, security vulnerabilities leading to cyber attacks are commonplace. It is a well-known fact that there are a series of cyber-attacks that are perpetuated by malicious people, we report various incidents of cyber attacks and online misbehavior of some parties, to gain an upper hand in

[ Read More ]

Migrate from Magento E-Commerce, Experts Advised

If you are an e-commerce site or involved in an online retail business, we highly recommend studying the possibility of moving from the Magento shopping cart system at the soonest possible time. We have reported about how insecure Magento twice in 2019 now, the first article was dated January 18, 2019, which disclosed a critical

[ Read More ]

Australia’s University Of Wollongong Cyber Attack Ready

Australia’s University of Wollongong (UOW) is taking strong defensive measures against cyber attacks in anticipation of its eventuality said by its spokesperson this week. This is through an effective lessening of the attack surface of University computers and Internet-connected devices as well as regular penetration testing, continued cybersecurity training for University staff and IT security

[ Read More ]

How to Keep Your Business Protected From Cyber Attack

On May 6, 2019, the city of Washington, Pennsylvania, suffered a malware attack that shut down its phone and messaging system for more than a week. The only exception is the 911 system, which operates throughout the county and continues to be available to residents of the city. This type of ransomware attack can occur

[ Read More ]

UAE’s Phishing And Social Engineering Problems

Global cloud-based email management firm Mimecast, in their State of Email Security report, revealed that their study revealed that UAE’s cyber impersonation cases are up by 75%, which caused financial loss for the victims. The report is a result of the aggregate information coming from more than a thousand IT leaders from multinational companies, with

[ Read More ]

Oracle WebLogic Servers Hit With Zero-Day Attack

Oracle WebLogic Servers are not the usual targets when it comes to cyber attacks. Besides, the service is a niche and is facing strong competition from the likes of Amazon with their AWS and Google with its fleet of web services. This time, a new ransomware variant named Sodinokibi has penetrated WebLogic Servers using a

[ Read More ]