Hackers sell Zoom exploits on Dark Web for up to $30,000

Video conferencing application Zoom is a target of hackers. Hackers are utilizing this newfound use of Zoom to expose user data including passwords, webcam/microphone security, emails, or device information. According to Devashish Sharma, CTO at workplace communication and collaboration platform Flock, it is crucial for businesses to have to right security apparatus in place toContinue reading “Hackers sell Zoom exploits on Dark Web for up to $30,000”

A Cybersecurity Lawyer Who Flagged The WHO Hack Warns Of ‘Massive’ Remote Work Risks

A large number of companies are rolling out mandatory work-from-home policies to help limit the risks posed by the coronavirus outbreak. But cybersecurity experts warn that those remote setups invite new hacking risks. This means that more personal devices, being used to handle and process business data are at the upmost risk. There have beenContinue reading “A Cybersecurity Lawyer Who Flagged The WHO Hack Warns Of ‘Massive’ Remote Work Risks”

Hackers target World Health Organization

World Health Organization Chief Information Security Officer Flavio Aggio reported that the identity of the hacking group is yet to be known, and cyberattacks against the organization have increased exponentially during the global coronavirus pandemic. A cybersecurity expert discovered this on March 13 via the unusual activity around the internet security. Expert Alexander Urbelis noticedContinue reading “Hackers target World Health Organization”

Hackers are exploiting critical vulnerability in Microsoft Exchange server

Hackers based out of China have been working exploit a vulnerability within the Microsoft Exchange email servers. This vulnerability, which Microsoft though they fixed, was thought to be patched back in February. The issue? A remote code execution vulnerability exists in Microsoft Exchange Server when the server fails to properly create unique keys at installContinue reading “Hackers are exploiting critical vulnerability in Microsoft Exchange server”

How North Korean Hackers Rob Banks Around the World

North Korean hackers have carried out a systematic effort to target financial institutions all over the world. Their methods are bold, though not always successful. In their most profitable operations, they have manipulated how major financial institutions connect to the international banking system. By tricking components of this system into thinking their hackers are legitimateContinue reading “How North Korean Hackers Rob Banks Around the World”

Hackers impersonate top VPN to steal cryptocurrency

Cybercriminals are attacking virtual private networks, or VPNs, in order to access private information on users personal computers. These cybercriminals are spread a malicious trojan by recreating known, popular and trusted IT sites and getting users to click false links. This malicious trojan is seeking to gain information such as: user browser history, login credentials,Continue reading “Hackers impersonate top VPN to steal cryptocurrency”

How Hackers Are Affecting Marketing Strategies

SEO, or search engine optimization, is a digital marketing strategy that increases the quality and quantity of website traffic. Hackers are targeting website security via this backdoor using malware and phishing attempts to harm customers or visitors to the site. Hackers are using SEO spam to trick users to think they are going onto aContinue reading “How Hackers Are Affecting Marketing Strategies”

Hackers targeting Satellites

SpaceX is at the front of the revolution in bringing access to Internet to everyone across the globe. In these efforts though, cybersecurity concerns have been brought up due to the vulnerability of the satellites that SpaceX houses. ” Makers of these satellites, particularly small CubeSats, use off-the-shelf technology to keep costs low. The wide availabilityContinue reading “Hackers targeting Satellites”

Hackers spreading the coronavirus?

Cybercriminals are using the coronavirus outbreak to steal the information of vulnerable people in Japan. Using the panic of the outbreak, hackers are spreading the Emotet trojan which is a common type of malware. This malware has been linked to and effective at attacking both financial and government institutions. Discovered by technology giant IBM, theContinue reading “Hackers spreading the coronavirus?”

Your Data Isn’t the Only thing being Hacked!

Car hacking has hit the streets! As more devices are being connected to the web, the internet of things is quickly encompassing more than just laptops, desktops and smart phones. Every modern vehicle has internet access and with internet access comes susceptibility to getting hacked. The hacking incidents, as written on ‘The Edge’ a cybersecurityContinue reading “Your Data Isn’t the Only thing being Hacked!”

Design a site like this with WordPress.com
Get started