Knowlegde

Organizations still rely on weak security for remote workers

0 comments Uncategorized

A new survey showed almost 80% of IT security leaders believe that remote workers are at more risk for phishing attacks because…

Read More

Beware of Malicious or Vulnerable Third Party Dependencies

0 comments Uncategorized

Rapid growth in third-party dependencies (including open-source libraries, packages and container images, etc.) has significantly changed the modern software development process. Most applications nowadays…

Read More

VPN Attacks: A Rising Threat for Remote Work in the COVID-19 Era

0 comments Uncategorized

In COVID-19 era, VPN become an important tool for the people to work from home. However, hackers are following the trend and…

Read More

Phishing maintained near-record levels in the first quarter of 2021

0 comments Uncategorized

The APWG (Anti-Phishing Working Group) has released a new Phishing Activity Trends Report saying that phishing maintained near-record levels in the first…

Read More

Shame culture is the biggest roadblock to increasing security posture

0 comments

Nowadays, many of cybersecurity team’s culture made themselves as antagonists rather than allies to the other company staffs. They usually judge the…

Read More

Ransomware Keep Evolving: Multiple Extortion

0 comments Uncategorized

Ransomware attacks are currently causing extensive havoc worldwide, becoming one of the biggest cyber threats nowadays. More and more companies and organisations…

Read More

Beware of Flash Phishing Attacks

0 comments Uncategorized

In the first quarter of this year, HKCERT has processed over 300 phishing attack incidents per month on average, up about 30%…

Read More

Kaspersky: Exploits for MS Office Flaws Most Popular in Q1 2021

0 comments Uncategorized

In Q1 2021, the vulnerabilities of Microsoft Office suite were the most popular target of hackers to exploit. Microsoft Office suite is popular…

Read More

Watch out: These unsubscribe emails only lead to further spam

0 comments

Researcher found that scammers user fake ‘unsubscribe’ spam emails, ask the receivers if they want to subscribe or unsubscribe their email, to…

Read More

Email spoofing: how attackers impersonate legitimate senders

0 comments

Spoofing email is an ordinary way of hackers to attack their target. This social engineering skills is usually based on some breached information….

Read More
1 2 3 4 7

ESSENTIAL