In this digital savvy world, what could be the most daunting nightmare of a technophile? Cyber-crime, evidently! Yes, online privacy and data breaches can shoot nervous breakdown of a tech-geek. And the way to ride out this issue is efficient cyber security, for sure! The nexus of techniques and tools to protect computer networks, programs, and data from illegitimate access ...
Read More »Author Archives: firewalltraining
DLL Hijacking attacks: What is it and how to stay protected?
DLL Hijacking attacks are broadly categorized into three types – DLL search order attack, DLL side-loading attack, and Phantom DLL Hijacking attack. For DLL hijacking attack to be successful, it would require an attacker to trick victims to open a file using a vulnerable application from a remote network location. DLL Hijacking is an attack vector that could allow attackers ...
Read More »Fireware 12.4 Beta Release
Fireware 12.4 Beta We’ve just posted the latest update to our Fireware 12.4 Beta release. This release, which is available for all Firebox appliances, continues WatchGuard’s commitment to building out our SD-WAN roadmap. We’ve seen very positive reaction to the features that we introduced in 12.3, and there has been lots of great feedback on 12.4 in the Beta forum ...
Read More »Cybercriminals leverage ‘Fake CDC Flu’ warning to distribute GandCrab 5.2 ransomware
The attack begins with users receiving a fake CDC email. In order to make it less suspicious, the email is distributed under the subject line of ‘Flu Pandemic Warning’. The infamous GandCrab is back in a new phishing campaign. Here, the attackers are using fake Center for Disease Control (CDC) warning to distribute the GandCrab 5.2 ransomware onto the victims’ ...
Read More »Sizmek reviews account breach that enable attackers to modify existing ads and offers
The credential of the affected user account is being sold on the dark web for a price starting from $800. Following the discovery, Sizmek has forced a password reset on all internal employee accounts. Sizmek, an American online advertising platform is investigating a security incident in which hackers have gained access to one of the firm’s user account. The credential ...
Read More »Attackers compromised Pakistani government website to deliver Scanbox Framework payload
Researchers detected a compromised Pakistani government website that delivers Scanbox Framework payload whenever anyone visits the site. Trustwave notified the Pakistani government website about the infection, however, the site still remains compromised. What is the issue – Researchers from Trustwave detected a compromised Pakistani government website that delivers Scanbox Framework payload whenever anyone visits the site. Worth noting – The compromised Pakistani ...
Read More »Man drives 3,300 miles to talk to YouTube about deleted video
On Sunday, police in Mountain View, California, where Google is headquartered, arrested a man who drove more than 3,300 miles from Maine to discuss what he thought was the company’s removal of his YouTube account and the one video he’d posted – one about getting rich quick. It was not, in fact, deleted by YouTube. It turns out, his wife ...
Read More »7 uncomfortable truths of Endpoint Security: A Sophos report
A report released today by Sophos reveals that IT managers are more likely to catch cybercriminals on their organization’s servers and networks than anywhere else. The study, 7 Uncomfortable Truths of Endpoint Security, surveyed over 3,100 IT managers in 12 different countries across industry verticals and organization sizes, and was conducted by the independent research specialist Vanson Bourne. The report reveals ...
Read More »SECURITY & FRAUDIndia Lender Warns Of WhatsApp Scam That Steals Bank Details
State Bank of India (SBI), the country’s biggest lender, has issued a warning that account holders are being tricked into offering up personal banking details. According to a report in BGR, SBI said messages from WhatsApp and other social media platforms are tricking customers into sharing details of their accounts. The hackers are tricking the users by first sending a message in an effort ...
Read More »Stolen email credentials being used to pry into cloud accounts
Malicious actors are using the massive supply of previously stolen login credentials to help brute force their way into high-profile cloud-based business systems that cannot easily use two-factor authentication for security. Proofpoint researchers found the availability of these tools has powered a massive increase in the number of cloud attacks taking place which in turn enable the attackers to possibly ...
Read More »