Identity Theft: Five Steps to Take for Full Recovery
No one wants to experience identity theft. But if it happens to you, you need to be prepared and know the right steps to take to gain full recovery ofRead More →
No one wants to experience identity theft. But if it happens to you, you need to be prepared and know the right steps to take to gain full recovery ofRead More →
Uploading files is very common on a good percentage of websites around the world. Platforms like LinkedIn or Facebook allow users to upload images, MP3, MP4, PDF files and manyRead More →
Spanish authorities report the emergence of a new phishing variant targeting users of social media platforms like Instagram. According to the report, threat actors try to take control of accountsRead More →
Local media and security researchers in Pennsylvania, U.S., report that a specialized unit of the Federal Bureau of Investigation (FBI) is investigating multiple hacking attempts against two major public waterRead More →
Cybersecurity specialists report detecting a new wave of attacks potentially linked to the Avaddon ransomware variant. This is a strain detected in early 2019 and is advertised as an asRead More →
Cybersecurity specialists report that a hacker or hacker group has been adding malicious servers to the Tor network in order to intercept traffic and perform an SSL attack variant targetingRead More →
U.S. authorities agreed the emergency pass of a new law after the country’s main pipeline was compromised by a ransomware attack that severely disrupted operations. Colonial Pipeline carries more thanRead More →
Bloodhound is a great visual tool that shows the relationship between multiple Active Directory objects and allows you to quickly evaluate the possibility of compromising relevant information, as well asRead More →
Cybersecurity experts report that a hacking group has developed a complex rootkit to perform backdoor tasks on Windows systems. As you will remember, a rootkit is a malicious tool designedRead More →
The U.S. Air and Space Forces, in collaboration with the cybersecurity community, announced the launch of the second edition of the hacking event Space Security Challenge: Hack-A-Sat. As the nameRead More →