Enterprises using both VMWare and Microsoft Windows Defender need to be wary of Cobalt Strikeattack. Apparently, threat actors have managed to find out how to deploy...
Realtek Wi-Fi modules are ever-present in wireless devices, mainly laptops. Flaws in these modules are potential security risks for devices that use them; and a flaw...
Hacking bounties are not limited to cybersecurity professionals and their client companies. Thanks to the continuing popularity of cryptocurrency, such as the recent streak of Bitcoin...
Zero-day attacks can be prevented by using intense network security infrastructure and protocols, something New York City’s Metropolitan Transportation Authority (MTA) apparently lacked after Chinese-backed hackers...
We’re only human, has never been a good excuse when being confronted with a mistake. Cybersecurity experts don’t find it much of an excuse either, but...
Chrome is the world’s most recommended browser and many browsers, including Microsoft’s is based from it. However, Chrome can be a memory hog, until The Great...
It’s no surprise that threat actors would take advantage of the current worldwide situation and come up with a tailor-made solution. This time, with everyone’s anxious...
There’s no end to what malicious actors would resort to in order to infiltrate their targets. Even the dead are not safe and their accounts can...
For those who are unaware, there has been an ancient lingering bug within the Microsoft Windows NTFS file system wherein a user’s hard disk can be...
When fishing, you of course go for the big fish. The bigger, the better. Same goes for phishing. You go for the executives, not the rank...