+966 1 14603027
United Arab Emirates
+971 4 4200563
A series of unfortunate events
Researchers accidentally release exploit code for new Windows ‘zero-day’ bug Print Nightmare
Research worker nets $30k when exposing users’ personal content
An ethical hacker has landed a $30,000 bug bounty payout after finding a security vulnerability in Instagram that potentially exposed users’ private content to nefarious actors.
Threat Actors Use Google Docs to Host Phishing Attacks
Exploit in the widely used document service leveraged to send malicious links that appear legitimate but actually steal victims credentials.
Stolen Data Points Collected in Billions by a Mysterious Custom Malware.
Anonymous malware led researchers to discover that a large number of files, credentials, cookies, and other data collected in the cloud database were stolen.
6M Gamer Profiles leaked through a Mobile Game.
Unprotected server exposes AMT Games user data containing user emails and purchase information.
Cybercrime Swamp transpired Threat Actors ‘Privateer’
‘Privateers’ aren’t necessarily state-sponsored, but they have some form of government protection while promoting their own financially-motivated criminal agenda, according to Cisco Talos.
Microsoft, Google Clouds Hijacked for Gobs of Phishing
Around 52M malicious messages in just Q1 2021
‘Scheme Flooding’- Websites Track Users Across Browsers.
A new and rising threat to cross-browser anonymity.
Fake COVID-19 Vaccine Phishing Website taken down by the federal Law.
‘Freevaccinecovax.org' pretended to be a biotech company, but it was actually gathering information from visitors for criminal purposes.
Multi-Gov Task Force Plans to Take Down the Ransomware Economy
A consolidation of 60 worldwide entities (counting the DoJ) has proposed a sweeping plan to chase down and disrupt ransomware gangs by going after their monetary operations.
It's common to fall victim to a cyberattack, but a VPN will assist you.
You might believe that cybercrime is more prevalent in countries where people are less tech savvy.
Securing your remote workforce
Canon EMEA Director of Information Security, shares his top 5 tips to protect yourself from cyberattacks.
Spread of Malware via WhatsApp by a fake Netflix app on Google Play.
Researchers discovered malware disguised as a Netflix app on the Google Play store that spread through WhatsApp messages.
Encryption’s vital role in GDPR Compliance
Data- viewed as a business-basic resource for associations, ought to be ensured against pernicious programmers searching for freedoms to take the information.
Bug Hunting: Proactive vs Expectations in Cyber Security.
The Malware Used to Inject SolarWinds Backdoor has Been Unveiled
Called "Sunspot," the malignant tool adds to a growing list of previously disclosed malicious software such as Sunburst and Teardrop.
This sector witnessed a 45% Spike in Cyber Attacks Since Nov 2020
Cyberattacks targeting healthcare organizations have spiked by 45% since November 2020 as COVID-19 cases continue to increase globally.
Your Private Documents could have been compromised by the Hackers Bug
Google has patched a bug in its feedback tool incorporated across its services that could be exploited by an attacker to potentially steal screenshots of sensitive Google Docs documents simply by embedding them in a malicious website.
Microsoft Caught Up in SolarWinds Spy Effort, Joining Federal Agencies
Also referred to the Breach of the month. The ongoing, growing campaign is “effectively an attack on the United States and its government and other critical institutions,” Microsoft warned.
Ransomware and IP Theft: Top COVID-19 Healthcare Security Scares
From ransomware attacks that crippled hospitals, to espionage attacks targeting COVID-19 vaccine supply chain, Beau Woods discusses the top healthcare security risks.
Amnesia:33 TCP/IP Flaws Affect Millions of IoT Devices
A new set of vulnerabilities has been discovered affecting millions of routers and IoT and OT devices from more than 150 vendors, new research warns.
Changing Employee Security Behavior Takes More Than Simple Awareness
Designing a behavioral change program requires an audit of existing security practices and where the sticking points are.
Experts Weigh in on E-Commerce Security Amid Snowballing Threats
How a retail sector reeling from COVID-19 can lock down their online systems to prevent fraud during the upcoming holiday shopping spike.
How to Write a Cybersecurity Playbook During a Pandemic
If it feels like you’re constantly revising the draft of your cybersecurity playbook these days, it’s because you probably are.
Cisco Patches High-Severity Bugs Impacting Switches, Fibre Storage
Nine bugs were patched, eight of which are rated 'high' severity.
MFA Bypass Bugs Opened Microsoft 365 to Attack
Vulnerabilities ‘that have existed for years’ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio.
© 2020 Delta Line International. All Rights Reserved.