• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.




Breaking  / Computer security  / Cyber Security  / data security  / Intruders  / Latest Cybersecurity News
The EU asks Europol to erase data of those that hadn’t committed crime
William Marshal Posted On January 10, 2022

Europol erase data

The European Union (EU) has ordered Europol to delete a huge database of data associated with EU citizens who weren’t associated with any crimes in recent years.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
Fertility Centers of Illinois hit by cyberattack affecting 80K patient data
William Marshal Posted On January 9, 2022

FCI data breach

Cyber criminals have compromised Fertility Centers of Illinois (FCI) and laid their hands-on 80,000 intimate patient data.


Continue Reading
0




Computer security  / Device security  / Linux security  / Mac security  / Windows security
FIN7 actors sent Malicious USB drives to US companies with ransomware
William Marshal Posted On January 8, 2022

FIN7 actors

The FBI has identified malicious USB devices that are sent to US companies in recent months with the motive to infect the company networks with malware and further payload drops. The group behind this malicious USB operation is found to be FIN7 actors, the ones behind BlackMatter and Darkside ransomware.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
Elephant Beetle steals millions of dollars from organizations worldwide
William Marshal Posted On January 5, 2022

Elephant Beetle

A threat actor that goes by the name ‘Elephant Beetle’ is using a combination of around 80 tools to steal millions of dollars from enterprises across the world.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
441K RedLine Malware affected accounts are included by Have I Been Pwned
William Marshal Posted On December 31, 2021

RedLine malware

If you’re wondering whether your email account is compromised by RedLine malware, you can check the same with ‘Have I Been Pwned’ website as RedLine malware has now 441,000 accounts that are compromised.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
AvosLocker Ransomware Group gives decryptor after breaching US Police
William Marshal Posted On December 30, 2021

AvosLocker Ransomware

AvosLocker Ransomware group has given a free decryptor after accidentally encrypting a US government agency.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / Guides  / Latest Cybersecurity News  / Linux security  / Mac security  / Mobile security  / What is  / Windows security
What is Cybersecurity and why is it important
William Marshal Posted On December 19, 2021

What is cybersecurity

Cybersecurity is a process of managing and securing networks, servers, computers, users, mobile devices, applications, and databases from cyberattacks, data leakage and unauthorized access. It is normally a combination of strategy, process, tools, skills and implementation to achieve improved cyber resilience against unforeseen data breaches and cyber attacks.


Continue Reading
0




Breaking  / Computer security  / Device security  / Latest Cybersecurity News  / Windows security
Third-patch is released to fix the critical Apache Log4j Vulnerability
William Marshal Posted On December 19, 2021

Apache Log4j Vulnerability

Apache Software Foundation(ASF) has released another patch for Log4j vulnerability and the version is 2.17.0. If not patched, the vulnerability tracked as CVE-2021-45105 could be exploited for Denial-of-Service (DoS) attack.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News  / Linux security  / Mac security  / Windows security
Log4j Vulnerability exploiters evolve the attack vector to mine Monero
William Marshal Posted On December 17, 2021

Log4j vulnerability

Cyber criminals are exploiting the Apache Log4j vulnerability and have switched their maneuvers from LDAP callback URLs to RMI or sometimes they are combined together for better success rates.


Continue Reading
0




Breaking  / Computer security  / Cyber Security  / data security  / Device security  / Latest Cybersecurity News
Patch the Log4Shell vulnerability now to avoid a data breach
William Marshal Posted On December 12, 2021

Log4Shell Vulnerability

Security researchers from Cybereason has published a ‘Vaccine’ that can be used as a mitigation to the critical ‘Log4Shell’ vulnerability on Apache Log4j code execution that is currently being exploited in the wild.


Continue Reading
0




15
Newer Posts Older Posts

  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search