live casino online

Blogs

Typosquatting Tactic Tricks Mac Users into Downloading Potentially Unwanted Application

July 25, 2018

New typosquatting campaign targets Mac users and redirects them to download potentially unwanted applications.

Read more  

  • March 08, 2018
    Securing the network against any and all kinds of threats (old, new, or otherwise) is every CISO’s goal. We looked at 2017’s biggest threats and compiled advice so CISOs can mitigate risks and secure their companies’ bottom line in 2018.
  • May 03, 2017
    Industrial routers can be used to gain access to robot controllers and other industrial machines. Having them exposed can lead to serious consequences for organizations and businesses.
  • January 31, 2017
    What makes routers susceptible to attacks? Users normally overlook the important fact that their routers serve as entryways to all connected devices.
  • December 14, 2016
    The emergence of IoT botnets brought to the fore the importance of securing IoT devices and routers. These devices can turn into zombies and become part of the botnets, which can then be used to perpetrate DDoS attacks.
  • August 08, 2016
    By analyzing ICS-CERT advisories and the vulnerabilities provided by our network of world-wide researchers working with the Zero Day Initiative program, it is possible to get an understanding of the attack surface that is exposed by HMI solutions.
  • May 28, 2016
    How are cybercriminals using routers to obtain user information? Domain Name System (DNS) changer malware can be used on routers to redirect users to malicious versions of legitimate sites.
  • May 17, 2016
    Do cybercriminals use offshore companies to hide ill-gotten gains? A look into various underground communities show that these services are being offered to cybercriminals too.
  • April 11, 2016
    A JavaScript hosted on compromised sites can exploit a vulnerability in ZTE modems. Learn how this flaw can be used to attack routers and other connected devices.
  • March 07, 2016
    Pawn Stormpawnstorm, the long-running cyber espionage campaign, added several government offices and one of the largest newspapers in Turkey to its long list of targets.