Atul Narula (Page 6)

He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.

Cybersecurity specialists report that a malware variant for the theft of passwords, credit cards, and cryptocurrency addresses is being distributed on the Internet through an alleged pirated copy of theRead More →

A joint operation by the Federal Bureau of Investigation (FBI), the Internal Revenue Service (IRS), and the Cyprus Police, allowed the dismantling of SSNDOB, an illegal dark web operation inRead More →

According to a report by the international news agency Reuters, the cryptocurrency exchange platform Binance would have allowed criminal groups to launder money for more than $2.35 billion between 2017Read More →

Millions of parents in the United States are suffering from the shortage of milk formula for babies, a completely unforeseen problem, with no apparent solutions and that is sowing greatRead More →

As part of a settlement from a class-action lawsuit, Google agreed to pay Google Photos users in Illinois, U.S., a total of $100 million after it was determined that theRead More →

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a security alert regarding a set of vulnerabilities that would allow malicious hackers to take control of Illumia genetic analysis devices.Read More →

Threat actors could exploit a critical zero-day vulnerability in Windows Search to run remotely hosted malware just by automatically opening a search window with a Word document. According to theRead More →

Symantec researchers discovered a new malicious operation using cryptocurrency malware identified as Clipminer. This strain would be based on the KryptoCibule malware, a Trojan with cryptocurrency and e-wallet theft capabilities,Read More →

Specialists from security firm Vedere Labs published research detailing how a ransomware variant could spread across an enterprise network using vulnerable Internet of Things (IoT) devices. For their research, theRead More →