Zephyrnet Logo

Tag: Cybersecurity

The Rise of the Open Bug Bounty Project

Can you imagine launching a global bug bounty platform with almost 500,000 submissions and 13,000 researchers without consuming a cent from venture capitalists?...

IoT Malware Campaign Infects Global Manufacturing Sites

The infection uses Lemon_Duck PowerShell malware variant to exploit vulnerabilities in embedded devices at manufacturing sites.A new malware campaign built to exploit flaws...

Exfiltrating Data from Air-Gapped Computers Using Screen Brightness

It may sound creepy and unreal, but hackers can also exfiltrate sensitive data from your computer by simply changing the brightness of the...

Identity Verification And Fraud Prevention In 2020: Closing The Trust Gap

As technology evolves, fraudsters and hackers adapt their techniques. They get smarter and find new ways to beat the tech. That is why...

Prepare for Cisco, CompTIA, and More IT Certifications with this Bundle

Exams are pretty important in professional IT. You can have all the practical knowledge in the world, but technical recruiters want to see...

Detecting malware patterns with cutting-edge graph search tools

This past July, Capital One was hit by one of the largest financial hacks in history, impacting the personal data of over 100 million...

What is Cloud Networking?

When you have many computers in a corporation with sensitive data or captured work that needs to be viewed regularly, digital space can...

Outpacing the Adversary: How Tactics-Based Detection Automatically Finds Attackers

If It Ain’t Broke, Don’t Fix It. If you were to pick a motto for cyber-criminals, that might not be what would come to...

SharePoint Bug Proves Popular Weapon for Nation-State Attacks

Thousands of servers could be exposed to SharePoint vulnerability CVE-2019-0604, recently used in cyberattacks against Middle East government targets.Researchers have detected multiple instances...

This WhatsApp Bug Could Have Let Attackers Access Files On Your PCs

A cybersecurity researcher today disclosed technical details of multiple high severity vulnerabilities he discovered in WhatsApp, which, if exploited, could have allowed remote...

Cybersecurity executive changes

February 4, 2020 Yassir Abousselham was named Splunk’s new Chief Information Security Office. Previously, Abousselham was CISO at Okta. In his new...

Ransomware Attacks: Why It Should Be Illegal to Pay the Ransom

For cities, states and towns, paying up is short-sighted and only makes the problem worse. When it comes to ransomware attacks on municipalities,...

Latest Intelligence

spot_img
spot_img