• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News
Russian Somnia ransomware group targets Ukrainian Organizations
John Greenwood Posted On November 14, 2022

Somnia Ransomware

A Russian malicious entity group is infecting multiple organizations in Ukraine with a new strain called Somnia Ransomware, encrypting the devices and affecting operations.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News
The UK NCSC scans internet connected devices to fortify security posture
John Greenwood Posted On November 4, 2022

NCSC scans devices

The UK’s National Cyber Security Centre (NCSC), is now leading a cybersecurity mission to scan all the devices connected to internet for vulnerabilities and loopholes.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / Device security  / Latest Cybersecurity News  / Mac security  / What is  / Windows security
What is man-in-the-middle attack?
John Greenwood Posted On September 4, 2022

Man-in-the-middle attack

When an attacker interrupts communication between two different entities in an attempt to eavesdrop the conversation, alter the information that is being communicated, spy on the entities or steal login credentials is called as man-in-the-middle (MITM) attack.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News
James Webb Telescope Image malware hidden and deployed by hackers
John Greenwood Posted On August 31, 2022

James Webb Telescope Image malware

Security analysts have identified a new malware campaign ‘GO#WEBBFUSCATOR’ that works on malicious documents, phishing emails, and space images form the James Webb telescope to distribute malware.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News  / Windows security
SaaS platforms are targeted by hackers with 1100% rise in phishing attacks
John Greenwood Posted On August 24, 2022

SaaS platforms

Cybercriminals are continuously targeting SaaS solutions and platforms to create dubious websites and steal login credentials.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News
Russian Oculus monitors websites for misinformation and anti-national activities
John Greenwood Posted On August 22, 2022

Russian Oculus

The Russian firm Roskmnadzor is working on a neural network called ‘Oculus’ which will employ AI to scan websites for any prohibited details.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Latest Cybersecurity News
Coca-Cola’s network may have been compromised by Stormous Hackers
John Greenwood Posted On April 27, 2022

Stormous hackers

Coca-Cola, the world’s major soft drinks manufacturer confirmed that a cyberattack reported on its network is suspected and is currently investigating the same. The US -based giant is investigating the Stormous hackers that has claimed to have breached into the company’s servers and have stolen around 160GB of corporate data.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Latest Cybersecurity News
UK retail chain ‘The Works’ hit by a Cyberattack forcing it to shutdown stores
John Greenwood Posted On April 7, 2022

The works cyberattack

UK retail chain ‘The Works’ announced that it has shutdown multiple stores after the firm was hit by a cyber attack that involved unauthorized access to its network.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Intruders  / Latest Cybersecurity News  / Windows security
Globant data breach by LAPSUSS affected 70 GB of data
John Greenwood Posted On March 31, 2022

Globant data breach

Globant data breach has been confirmed by the company as threat actors have gained accessed their key repository.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News  / Windows security
AvosLocker ransomware is found targeting US critical infrastructures
John Greenwood Posted On March 20, 2022

Avoslocker ransomware

The FBI has warned US organizations that AvosLocker ransomware is found targeting US critical infrastructure sectors recently.


Continue Reading
0




11
Newer Posts Older Posts

  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search