Cyber Security (Page 32)

Cyber Security News | Infosec Blog | Information Security Tutorials

The U.S. Department of Justice (DOJ) announced the arrest of two individuals accused of stealing more than $4.5 billion worth of cryptocurrency posing as tech entrepreneurs. The marriage formed byRead More →

A hacking group self-identified as Edalat Ali has exposed online multiple videos and files allegedly obtained from Iran’s Ghezel Hesar prison. Using an Instagram account, the hackers posted images ofRead More →

Ransomware is one of the most dangerous malware variants that can infect a vulnerable system. When this attack manages to bypass our security measures, all stored files will be encryptedRead More →

Cybersecurity specialists have confirmed that the main oil terminals in Europe have been victims of a cyberattack that has generated severe interruptions in their operations. According to a specialized report,Read More →

Cybersecurity specialists from Imperial College London developed a fuzzing tool capable of solving some of the most frequent problems when testing network applications. Dubbed SnapFuzz, this tool uses a numberRead More →

Cybersecurity specialists report that a hacking group is directing dangerous hacking campaigns against Palestinian individuals and organizations using a dangerous malware variant identified as Micropsia. According to the Cisco TalosRead More →

German petrol distribution firm Oiltanking GmbH, which is responsible for supplying Shell gas stations across the country, confirmed it suffered a cyberattack that severely impacted its operations. This company isRead More →

The enthusiasm generated by non-fungible tokens (NFT) has proved beneficial to threat actors, who in recent months have created supposed NFT investment projects that disappear overnight along with investors’ money.Read More →

A couple of weeks ago, Proofpoint researchers detected a new malicious campaign identified as OiVaVoii employing hijacked Office 365 accounts and a sophisticated combination of phishing tactics, data theft, andRead More →