Knowlegde

Organizations still rely on weak security for remote workers

0 comments

A new survey showed almost 80% of IT security leaders believe that remote workers are at more risk for phishing attacks because…

Read More

Beware of Malicious or Vulnerable Third Party Dependencies

0 comments

Rapid growth in third-party dependencies (including open-source libraries, packages and container images, etc.) has significantly changed the modern software development process. Most applications nowadays…

Read More

VPN Attacks: A Rising Threat for Remote Work in the COVID-19 Era

0 comments

In COVID-19 era, VPN become an important tool for the people to work from home. However, hackers are following the trend and…

Read More

Phishing maintained near-record levels in the first quarter of 2021

0 comments

The APWG (Anti-Phishing Working Group) has released a new Phishing Activity Trends Report saying that phishing maintained near-record levels in the first…

Read More

Shame culture is the biggest roadblock to increasing security posture

0 comments

Nowadays, many of cybersecurity team’s culture made themselves as antagonists rather than allies to the other company staffs. They usually judge the…

Read More

Ransomware Keep Evolving: Multiple Extortion

0 comments

Ransomware attacks are currently causing extensive havoc worldwide, becoming one of the biggest cyber threats nowadays. More and more companies and organisations…

Read More

Beware of Flash Phishing Attacks

0 comments

In the first quarter of this year, HKCERT has processed over 300 phishing attack incidents per month on average, up about 30%…

Read More

Kaspersky: Exploits for MS Office Flaws Most Popular in Q1 2021

0 comments

In Q1 2021, the vulnerabilities of Microsoft Office suite were the most popular target of hackers to exploit. Microsoft Office suite is popular…

Read More

Watch out: These unsubscribe emails only lead to further spam

0 comments

Researcher found that scammers user fake ‘unsubscribe’ spam emails, ask the receivers if they want to subscribe or unsubscribe their email, to…

Read More

Email spoofing: how attackers impersonate legitimate senders

0 comments

Spoofing email is an ordinary way of hackers to attack their target. This social engineering skills is usually based on some breached information….

Read More
1 2 3 4 7

ESSENTIAL