KT Corp’s customers couldn’t access the internet for approx 40 minutes. Networkfailure was throughout the country. The failure was caused by a DDOS attacks,although…
Cybersecurity Issues
Ransomware is disastrous for businesses: future holds bigger challenges
Technology company Comparitech reported a study that assessed 186 ransomware attacks against U.S. businesses in 2020. The study concluded that companies lost US$21 billion…
Atlassian Confluence RCE Flaw Abused
Opportunistic threat actors were discovered actively exploiting a previously published severe security weakness in Atlassian Confluence deployments on Windows and Linux to deploy web…
Cyberfraud is hitting Color
According to survey data collected by an internet security company, Malwarebytes in collaboration with the nonprofits Digitunity and the Cyberfraud Support Network, black people,…
Software Security: The Root Cause Conundrum
Regardless of how long we’ve been building software and related security and audit activities, it appears that we’re still treading water. Cybercriminals are still…
Google, Microsoft, and Oracle has most vulnerabilities in early 2021
Google holds the top opening with more than 547 weaknesses, Microsoft is on number two with 432 undesirable openness occurrences and Oracle is on…
APT-C-36 Drops Commodity RATs
APT-C-36 is now running a spam campaign that uses commodity RATs to infiltrate South American companies for financial gain. njRAT, BitRAT, Async RAT, and…
Texas Right to life website expose Job applications
It was discovered that hundreds of job applicants’ personal information had been compromised due to a glitch on Texas Right to Life website that…
IoT attacks : doubling in six months.
More than 100 percent more IoT devices were attacked in the first six months of 2021, according to researchers. After analyzing its honeypot telemetry,…
Playbook by Ransomware-as-a-Service provider Leaked Source Code
According to researchers, Conti, the group that provides ransomware as a service (RAAS), just exposed their playbook. In addition to the Cobalt Strike handbook…