Atul Narula (Page 32)

He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.

A cybersecurity specialist reports the detection of a dozen vulnerabilities in myPRO, a product developed by industrial automation firm mySCADA. Among the reported flaws, the expert highlighted an error consideredRead More →

Cybersecurity experts predict that AvosLocker ransomware infections will increase considerably on these holidays. While this is a newly emerging ransomware variant, it has already been detected in multiple incidents, wreakingRead More →

Internet entrepreneur Justin Kan had recently launched his own non-fungible token (NFT) platform, joining a growing but controversial trend. Although Kan’s obvious goal was to make a profit, shortly afterRead More →

KELA cybersecurity researchers, dedicated to monitoring illegal activity on the dark web and on the conventional Internet, report the detection of a new black market platform that has recently appearedRead More →

Cybersecurity specialists report the detection of a flaw that would allow threat actors to abuse a set of load optimization features in Google Chrome to evade the Site Isolation feature.Read More →

The cybersecurity unit of the Federal Bureau of Investigation (FBI) has launched an alert to notify organizations using ManageEngine Desktop Central, developed by Zoho, that a hacking group is exploitingRead More →

According to a report by the Daily Mail, a Russian hacking group infected the systems of some police departments in the United Kingdom with a ransomware variant and leaked someRead More →

Exploiting vulnerabilities detected in previous versions of Log4j remains a severe issue, so the cybersecurity community is still looking for the best ways to prevent a cyberattack. However, some usersRead More →

Kali Linux is one of the best and most popular ethical hacking and security auditing tools, as it allows cybersecurity experts to run all the hardware of a system andRead More →