Expert(s): muhammad malik

  LATEST IN

  SECURITY ARTICLES

For many years, information security has been built on the concept of perimeter-based network security that assumes all internal entities within a network boundary are trusted and external entities are

While the UK begins to cautiously return to some semblance of normality, seeing diners in restaurants and people enjoying weekends away reminds us of some of our pre-pandemic pastimes. However,

One of the most concerning issues for IT leaders and organisations in 2021 is the impact of technology blind spots. Snow Software’s 2021 IT Priorities Report found that an awareness gap still

  ALL POSTS

Hackers have broken into gaming giant Electronic Arts, the publisher of Battlefield, FIFA, and The Sims, and stole a wealth of game source code and related internal tools. “You have full capability of exploiting on

BACKGROUND: Researchers from Toshiba have successfully sent quantum information over 600-kilometer-long optical fibers, creating a new distance record and paving the way for large-scale quantum networks that could be used

BACKGROUND: The Italian government has announced plans to set up a national cybersecurity agency as part of a wider initiative to create a secure, unified cloud infrastructure for the country. The

The world’s largest meat processing company has paid the equivalent of $11m (£7.8m) in ransom to put an end to a major cyber-attack. Computer networks at JBS were hacked last

BACKGROUND: Researchers at Nordlocker have reported on Nameless malware that stole 1.2 TB of private data, discussing their case study of a 1.2-terabyte database collected from “over 3 million Windows-based computers” between

BACKGROUND: It has been reported that The world’s largest password collection was posted on a prominent hacker forum. A member submitted a 100 GB text file containing 8.4 billion passwords, most

For many years, information security has been built on the concept of perimeter-based network security that assumes all internal entities within a network boundary are trusted and external entities are

The Colonial Pipeline CEO has defended the action he took in response to the recent ransomware attack on his company, telling a Senate hearing on Tuesday his priority was to restore

BACKGROUND: In light of the ongoing conversation around the Colonial Pipeline hack and the latest findings showing that hackers used a VPN account to breach the network using just a

BACKGROUND: It has been reported that two schools have closed after hackers broke into their servers, stole data and encrypted pupil information. Officials at the Skinners’ Kent Academy and Skinners’

BACKGROUND: Multiple outlets are reporting the NYC Cyber Command first detected the breach on Saturday.  The law dept. has over 2,000 employees and services over 1,000 lawyers, who have lost access

BACKGROUND: The president and CEO of Colonial Pipeline is giving a public account of the initial hours following the ransomware attack last month. This comes at an interesting time as

BACKGROUND: A new study has warned of a vast network of bot accounts that have been set up to propagate misinformation and undermine critical expert advice on the COVID-19 crisis.

BACKGROUND: Amazon has now implemented its controversial ‘Sidewalk’ initiative, an experimental service that will automatically turn every Echo speaker, Ring camera and other Amazon device into a shared wireless network.  

According to the latest research by Agari, 50% of compromised accounts were accessed within 12 hours and 91% of all accounts were manually accessed by threat actors within the first week. Once

Crippling ransomware attacks are hitting businesses, governments, and the public sector with alarming regularity. The severity of the situation is such that the White House has taken the unprecedented step of

While the UK begins to cautiously return to some semblance of normality, seeing diners in restaurants and people enjoying weekends away reminds us of some of our pre-pandemic pastimes. However,

It has been reported that the UK’s leading cybersecurity authority has updated its guidance on ransomware following a spate of attacks on the education sector. GCHQ spin-off, the National Cyber Security Centre (NCSC), said

BACKGROUND: A new malware designed to compromise Kubernetes and create backdoors into businesses. This new malware has been active for more than a year and is compromising Windows containers to

BACKGROUND: The US investigators have recovered millions in cryptocurrency they say was paid in ransom to hackers whose attack prompted the shutdown of the key East Coast pipeline last month, the Justice

Check Point Research (CPR) urges Windows users to update their software, after discovering four security vulnerabilities that affect products in Microsoft Office suite, including Excel and Office online. Rooted from

BACKGROUND: The popular websites including Reddit, Spotify, Twitch, Stack Overflow, GitHub, gov.uk, Hulu, HBO Max, Quora, PayPal, Vimeo, Shopify, and news outlets CNN, the Guardian, the New York Times, BBC,

BACKGROUND: A leaked spreadsheet circulating around WhatsApp has exposed the personal details of more than one thousand UK Special Forces soldiers, which are meant to remain secret. The Register, which

BACKGROUND: It has been reported that researchers have tracked down the origins of several increasingly prevalent info-stealers – including Redline, Taurus, Tesla and Amadey – that threat actors are delivering via pay-per-click (PPC)

BACKGROUND: Last week, NCSC announced it is investigating another increase in ransomware attacks against schools, colleges and universities in the UK. SonicWall’s threat research reveals that: The UK was the

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy