LabCorp Security Breach Puts Millions of Patient Records at Risk

LabCorp Security Breach puts millions of patient records at risk, LabCorp serves more than 115 million patient annually. On July 14th hackers got access to the LabCorp’s network and their...

Most Advanced Backdoor Obfuscation and Evasion Technique

Cybercriminals are using the most sophisticated techniques to bypass the security controls in a various organization such as  IT, medical, manufacturing industries, energy sectors, even government entities. Sometimes developers are creating...

How to Choose the Best automobile Car Cover in Nigeria

When the severe weather comes like snowfalls, heavy rainstarts, or the heavy wind blows, you can sure to protect your...

Oracle Patch Update to Address 334 Vulnerabilities Across All the Products

Oracle Releases Critical Patch Updates that contains security fixes for 334 products across all the families. The Oracle Patch Update covers products including Oracle Database Server, Oracle Global Lifecycle Management, Oracle...

Blackgear Cyberespionage Abuses Blogging and Social Media Services To Evade Detection

Blackgear Cyberespionage campaign is active at least from 2008, the threat actors behind the campaign use various malware tools such as the Protux and Elirks backdoor. Trend Micro Security researchers...

How to build and run a Security Operations Center

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise. This includes a vast array of sophisticated detection...

Administrator of The Infamous Silk Road Market Extradited To US To Face Charges

The US Attorney for the Southern District of New York announced the extradition of 30-year-old Irish Man Gary Davis who goes with the online handle “Libertas”. He was arrested in...

Can You Be An Amazon Affiliate Without a website?

Do you need a website? A separate one for Amazon affiliate marketing? Just stop there and take a moment to...

The return of Fantomas, or how we deciphered Cryakl

In early February this year, Belgian police seized the C&C servers of the infamous Cryakl cryptor. Soon afterwards, they handed over the private keys to our experts, who used them...

Investing in Fraud Detection Software

Businesses are constantly trying to find better ways to fight fraud but one question many are left asking is ‘is fraud detection software worth the expense?’. A tool to tackle...

LATEST NEWS

MUST READ