In the last three years, thousands of personal computers were attacked by Petya and NotPetya. After targeting the networks, they encrypt the hardware of these computers. Notpetya and Petya are two different things, but they do share many standard features. Notpetya is more potent as it helps to spread and infect computer easily, whereas Petya is a type of ransomware that makes a quick Bitcoin from … [Read more...] about Petya ransomware and NotPetya malware
Cyber security threats
How to prevent, detect and defend against Credential stuffing
Credential stuffing is a new form of cyber attack in which the criminal uses collected usernames and passwords from previous breaches to gain fraudulent access to user accounts. The cybercriminals collect billions of login credentials over the years as a result of data breaches. They use these credentials for spam, phishing, and account takeovers. Credential stuffing is becoming a common way of … [Read more...] about How to prevent, detect and defend against Credential stuffing
Attacker’s phish Office 365 users with fake voicemail messages
The cybercriminal is targeting office 365 constantly as they can get access to high-value company data and systems. The attackers have used a new game to attack office 365 by using an audio file hidden as a voicemail to trick the user and their password. Office 365 observed the campaign over the past few weeks, and the targeted organization were finance, IT, retail, insurance, manufacturing, … [Read more...] about Attacker’s phish Office 365 users with fake voicemail messages
Four significant changes coming to cybersecurity in 2020 and beyond
Some extraordinary changes have been observed in enterprise security development. Security analyst believes that these changes will become more frequent and visible in 2020. Having a proper Cybersecurity has become a business-critical, incredibly dynamic, massively scalable, and highly specialized discipline. However, some companies are still using disconnected point tools, manual processes, … [Read more...] about Four significant changes coming to cybersecurity in 2020 and beyond
Four questions to answer before paying a ransomware demand
The cybersecurity expert believes that one should never pay the ransom that cybercriminal demands as it encourages them. Many of the infected firms have paid the ransom, and those who haven’t been paid wish they should have paid it. Most of the impacted firms have paid the ransom because there was no other option of recovery except to fulfil their demand. The cybercriminals are getting better … [Read more...] about Four questions to answer before paying a ransomware demand