Cybersecurity Blog


Subscribe

Posts tagged: Cloud Security

Category: Cybersecurity

Cisco Patches Critical Flaws Exposed by NSA Leak

Cisco Patches Critical Flaws Exposed by NSA Leak


Posted August 18, 2016 in Data Breach, Malware, Cloud Security

Cisco rushed emergency patches after NSA exploit tools exposed serious firewall vulnerabilities. Update your Cisco...

NSA Zero-Day Exploits Force Cisco Emergency Patches

NSA Zero-Day Exploits Force Cisco Emergency Patches


Posted August 18, 2016 in Data Breach, Malware, Cloud Security

Leaked NSA hacking tools revealed critical Cisco firewall vulnerabilities. Learn which devices are affected and why...

Snowden Reacts to NSA Shadow Brokers Hack

Snowden Reacts to NSA Shadow Brokers Hack


Posted August 17, 2016 in Malware, Data Breach, Cloud Security

Edward Snowden weighed in on the Shadow Brokers NSA hack with insider perspective on how the breach likely occurred....

Major Hotel Data Breach Hits Marriott, Hyatt, Starwood

Major Hotel Data Breach Hits Marriott, Hyatt, Starwood


Posted August 16, 2016 in Data Breach, Malware, Cloud Security

A breach at HEI Hotels exposed credit card data across 20 Marriott, Hyatt, and Starwood properties. Check if you...

Shadow Brokers Hack the NSA: What Was Stolen

Shadow Brokers Hack the NSA: What Was Stolen


Posted August 16, 2016 in Data Breach, Malware, Cloud Security

The Shadow Brokers claimed to steal elite NSA hacking tools and auctioned them online. Discover what was exposed and...

New Scam Targets Small Businesses: Hackers Shift Focus

New Scam Targets Small Businesses: Hackers Shift Focus


Posted August 15, 2016 in Data Breach, Cloud Security, Malware

Hackers are abandoning big corporations to target small businesses with less security. Discover the latest scam...

Video Jacking: Phone Hacking via Screen Mirroring

Video Jacking: Phone Hacking via Screen Mirroring


Posted August 11, 2016 in Data Breach, Malware, Cloud Security

Hackers can record everything on your phone screen through a compromised charging station. Learn how video jacking...

ProjectSauron: Advanced Malware Hidden for 5 Years

ProjectSauron: Advanced Malware Hidden for 5 Years


Posted August 9, 2016 in Malware, Data Breach, Cloud Security

Researchers discovered ProjectSauron, nation-state malware undetected for five years. Learn how this advanced threat...

USB Drive Attacks: Why Found Devices Are Dangerous

USB Drive Attacks: Why Found Devices Are Dangerous


Posted August 8, 2016 in Malware, Data Breach, Cloud Security

Dropping infected USB drives is a proven hacker tactic. Nearly half of people who find one plug it in. Learn why this...

Zero Days Documentary: Stuxnet Cyber Warfare Exposed

Zero Days Documentary: Stuxnet Cyber Warfare Exposed


Posted August 5, 2016 in Malware, Data Breach, Cloud Security

The Zero Days documentary reveals the true story of Stuxnet, the cyber weapon that changed warfare forever. A...

Critical HTTP/2 Vulnerabilities Discovered

Critical HTTP/2 Vulnerabilities Discovered


Posted August 4, 2016 in Malware, Data Breach, Cloud Security

Researchers found major security flaws in HTTP/2 that undermine its safety claims. Learn what these vulnerabilities...

PayPal Phishing Scam Uses Legit Email Accounts

PayPal Phishing Scam Uses Legit Email Accounts


Posted August 2, 2016 in Malware, Data Breach, Cloud Security

Cybercriminals now send phishing links from real PayPal accounts with fake payment requests. Learn to spot this...