• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
San Francisco 49ers hit by BlackByte ransomware attack
John Greenwood Posted On February 13, 2022

BlackByte ransomware

The San Francisco 49ers NFL team fell victim to BlackByte ransomware attack and has its corporate files encrypted. The operators have also stolen the data as per the double extortion attack vector and published sample on their data leak site.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News  / Windows security
Microsoft Patch Tuesday February 2022 fixes 51 vulnerabilities
John Greenwood Posted On February 9, 2022

Detailed breakdown of Microsoft Patch Tuesday February 2022

Microsoft Patch Tuesday February 2022 comes with fixes for 51 vulnerabilities across Windows Office, Azure Data Explorer, Teams, Visual Studio Code, Kernal and Win32K.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / Device security  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
New Sugar ransomware demands low ransom targeting normal users
John Greenwood Posted On February 7, 2022

Sugar ransomware

A new type of ransomware is found targeting individual user devices and not corporate networks, which is also demanding for low ransom.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News
Hackers stole $322 million cryptocurrency from the Wormhole Cyberattack
John Greenwood Posted On February 3, 2022

Wormhole Cyberattack

The Wormhole Cyberattack incident happened earlier today and has affected Wormhole Portal, a web-based application called as Blockchain bridge, which allows users to convert cryptocurrency from one form to another.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
SureMDM security vulnerabilities can lead to Supply Chain Attacks
John Greenwood Posted On February 1, 2022

SureMDM security vulnerabilities

Multiple security vulnerabilities have been disclosed in 42 Gears SureMDM solution. It is a mobile device management solution that can be manipulated by threat actors to execute supply chain attacks.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
Court orders websites to stop embedding Google Fonts for GDPR violation
John Greenwood Posted On January 31, 2022

Google Fonts

A German Court from Munich has ordered a website owner to pay a penalty of €100 for migrating personal data of users. The owner has leveraged the IP address of the users via Google Fonts library without the user’s consent.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
More than 20,000 data centers and ILO are exposed to threat actors
John Greenwood Posted On January 29, 2022

data centers

Security researchers at Cyble have identified more than 20,000 instances of data centers that are exposed publicly and could cause catastrophic results if breached by hackers.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Intruders  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
New initiative to secure US water-systems against Cyberattacks
John Greenwood Posted On January 28, 2022

US water-systems

The United States under Biden’s command will initiate a new agenda to protect the country’s water sector against cyberattacks, which comes besides their security hardening protocols undertaken recently.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / Device security  / Intruders  / Latest Cybersecurity News  / Linux security  / Mac security  / What is  / Windows security
What, Why and How of REvil Ransomware Attack
John Greenwood Posted On January 24, 2022

REvil Ransomware attack

REvil ransomware is a malware that encrypts victims data and asks for a ransom just like any other ransomware. The threat usually asks the ransom in bitcoin that needs to be paid in a limited time if not the ransom amount will continue to rise.  


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Latest Cybersecurity News
Bank Indonesia ransomware attack by Conti hackers leave 13.88 data at stake
John Greenwood Posted On January 21, 2022

Bank Indonesia ransomware attack

The Conti ransomware group orchestrated an attack on Bank Indonesia last month and the same has been confirmed yesterday by the organization.


Continue Reading
0




14
Newer Posts Older Posts

  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search