Category Archives: Article

A Guide to Creating an Incident Response Plan
14 Dec

A Guide to Creating an Incident Response Plan

Cyber security is one of the direst threats facing modern businesses today. Global cyber-crime damages are set to exceed $6 trillion each year by 2021. Despite the growing threat of cyber-attacks, more than half of businesses that suffered an attack didn’t anticipate any changes to their security measures for next year. Increasing cyber-attacks will help triple the number of unfilled cyber-security […]

read more »
PayPal’s TIO Networks reveals data breach impacted 1.6 million users
05 Dec

PayPal’s TIO Networks reveals data breach impacted 1.6 million users

The company says evidence of “unauthorized access” has appeared during a recent investigation. PayPal’s recently-acquired payment processor TIO Networks has revealed that up to 1.6 million customers have had their information stolen in a recent data breach. Last week, the Vancouver, Canada-based TIO Networks said that following the suspension of operations, evidence has been uncovered […]

read more »
NEWLY PUBLISHED EXPLOIT CODE USED TO SPREAD MIRAI VARIANT
28 Nov

NEWLY PUBLISHED EXPLOIT CODE USED TO SPREAD MIRAI VARIANT

Qihoo 360 Netlab researchers reported on Friday that they are tracking an uptick in botnet activity associated with a variant of Mirai. Targeted are ports 23 and 2323 on internet-connected devices made by ZyXEL Communications that are using default admin/CentryL1nk and admin/QwestM0dem telnet credentials. “About 60 hours ago, since 2017-11-22 11:00, we noticed big upticks on […]

read more »
WIFIPHISHER WI-FI HACKING TOOL AUTOMATES PHISHING ATTACKS
18 Nov

WIFIPHISHER WI-FI HACKING TOOL AUTOMATES PHISHING ATTACKS

A new Wi-Fi attack tool has been made available on GitHub that automates phishing attacks over WPA networks, putting credentials and other supposedly secret data at risk. The tool, called wifiphisher, jams Wi-Fi access points with deauthentication packets and then mimics the target access point before presenting the wireless device with a phony WPA log-in page. […]

read more »
Dirty COW — Critical Linux Kernel Flaw Being Exploited in the Wild
17 Nov

Dirty COW — Critical Linux Kernel Flaw Being Exploited in the Wild

A nine-year-old critical vulnerability has been discovered in virtually all versions of the Linux operating system and is actively being exploited in the wild. Dubbed “Dirty COW,” the Linux kernel security flaw (CVE-2016-5195) is a mere privilege-escalation vulnerability, but researchers are taking it extremely seriously due to many reasons.First, it’s very easy to develop exploits […]

read more »
5-Year-Old Linux Kernel Local Privilege Escalation Flaw Discovered
17 Nov

5-Year-Old Linux Kernel Local Privilege Escalation Flaw Discovered

A 5-year-old serious privilege-escalation vulnerability has been discovered in Linux kernel that affects almost every distro of the Linux operating system, including Redhat, and Ubuntu. Over a month back, a nine-year-old privilege-escalation vulnerability, dubbed “Dirty COW,” was discovered in the Linux kernel that affected every distro of the open-source operating system, including Red Hat, Debian, […]

read more »