Cloud Computing Security

Cloud Computing Security Vulnerabilities and What to Do

7th May 2021, Kathmandu Cloud vulnerability (Cloud Security Monitoring - Reduce Hours of Vulnerability) Many organizations are continuously trying to establish on cloud nowadays, which is one of the most important reasons why...
DDOS Attack Nepal

Nepal DDOS Attack Trends & How You Should Respond

5th May 2021, Kathmandu Digital Network Solutions is all set to organize DDOS Attack trends in Nepal and How we should respond to the webinar on 12th May 2021 from 11 a.m. The...
Kerberos KDC Vulnerability

F5 BIG-IP Found Vulnerable to Kerberos KDC Vulnerability

30th April 2021, Kathmandu F5 Networks this week released patches to address an authentication bypass vulnerability affecting BIG-IP Access Policy Manager (APM), but fixes are not available for all impacted versions. “The KDC...
REDDIT MAIN LOGO

Case Against REDDIT For Not Removing Child Sexual Abuse Material

27th April 2021, Kathmandu One female has filed a case against Reddit. She blamed her ex-boyfriend for posting her 16 years old porned photo time and again. The issue applies to controversial measures...
Chrome Zero-Day

Chrome Zero-Day Exploit Posted on Twitter

27th April 2021, Kathmandu The term “Zero-day” is an imaginative time, as this type of cyberattack happens in less than a day since the awareness of the security flaw. Thereby, not giving...
Zero Trust

Zero Trust: The Mobile Dimension

27th April 2021, Kathmandu Hank Schless, senior security options manager at Lookout, discusses how to secure remote performing through mobile gadgets. Hank Schless, is senior security answers manager at Lookout. Soon after embarking...
Saint Bot

Saint Bot – A New Malware Downloader Spotted

25th April 2021, Kathmandu With the rapid technological advancement in the cybercrime realm, attackers are coming up with new ways of quickly developing and deploying sophisticated malware. Recently, security researchers identified a...
TV tech loophole

THE smart TV tech loophole allowed miscreants to view private YouTube videos

25th April 2021, Kathmandu Smart TV Tech Loophole Allowed Miscreants to View Private YouTube Videos. Security researcher earned a $6,000 bug bounty after uncovering a set of web security flaws that allowed attackers to...
Apple macOS TextEdit

Apple macOS TextEdit Parsing Flaw leaked local Files via Dangling

25th April 2021, Kathmandu Apple macOS TextEdit parsing flaw leaked local files via dangling markup injection UPDATED A vulnerability in macOS allowed attackers to execute malicious HTML on TXT files which, if opened by...
Vulnerabilities

Vulnerabilities in Single Sign-On Services Could be Abused to Bypass Authentication

25th April 2021, Kathmandu Vulnerabilities in Single Sign-On services could be abused to bypass authentication controls A category of vulnerability detected in a number of Single Signal-On (SSO) companies may enable attackers to...
Cyber Warfare

Cyber Warfare: The Battle Tact of the Digital Age

25th April 2021, Kathmandu As cyberattacks continue to bypass even the tightest cybersecurity measures, the impact on consumers is reaching new heights – and investors are feeling the pressure Cyberwarfare is a computer-...
Vulnerability Remediation

Is Automated Vulnerability Remediation the Answer?

25th April 2021, Kathmandu Executing a well-run vulnerability management program is essential to protecting against data breaches and ensuring the availability of your IT infrastructure. What is your mean time to remediate...
EC-Council Certification Exams

CEH and Four Other EC-Council Certification Exams Earn College Credit

25th April 2021, Kathmandu EC-Council is pleased to announce five certifications that recently received approval from the American Council on Education (ACE). This is a major step to help jump-start college careers as well as...
Prometei Botnet

Prometei Botnet Exploiting Unpatched Microsoft Exchange Servers

25th April 2021, Kathmandu Attackers are exploiting the ProxyLogon Microsoft Exchange Server flaws to co-opt vulnerable machines to a cryptocurrency botnet named Prometei, according to new research. "Prometei exploits the recently disclosed Microsoft...
Hackers Exploit VPN

Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion

25th April 2021, Kathmandu The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed details of a new advanced persistent threat (APT) that's leveraging the Supernova backdoor to compromise SolarWinds Orion installations...
Password Resets Add Up

Cost of Account Unlocks, and Password Resets Add Up

There are many labor-intensive tasks that the IT service desk carries out on a daily basis. None as tedious and costly is resetting passwords. Modern IT service desks spend a significant amount...
IOT Security Controls

5 Fundamental But Effective IoT Device Security Controls

25th April 2021, Kathmandu Matt Dunn, the associate managing director for cyber-risk at Kroll, discusses how to keep networks safe from insecure IoT devices. As the pandemic continues to fuel the shift to...
Cyberthreats loom

Cyberthreats Still Loom Over E-learning Platforms

24th April 2021, Kathmandu E-learning or electronic learning, Is the delivery of learning and training through digital resources or devices such as computers, tablets, and even cellular phones that are connected to...
API Risks

API Risks: What are They and How to Manage Them

24th April 2021, Kathmandu API security risks are a common problem in today’s cyber world. Unfortunately, cyberattacks have become an everyday word in today’s vernacular. Like any software, APIs can be compromised...
Malvertising Mayhem

Everything You Need to Know About the Malvertising Mayhem

Everything You Need to Know About the Malvertising Mayhem What is Malvertising? Malvertising is a pet name for malware that’s delivered through online advertising techniques. The ads look authentic. Often, legitimate third-party marketing companies distribute...
Solarwinds Hack

Solarwinds Hack Orchestrated by Russia’s SVR, Claims U.S. and U.K.

24th April 2021, Kathmandu Hackers working for the Russian foreign intelligence service are behind the SolarWinds attack, cyber-espionage campaigns targeting COVID-19 research facilities, and more, according to the United States and the...
Mount Locker Ransomware

Mount Locker Ransomware Aggressively Changes Up Tactics

24th April 2021, Kathmandu Mount Locker group first announced their ransomware-as-a-service offering in the second half of 2020, and attacks attributed to the variant have been on the rise since. In early...
Cyberattackers Hunt

4 Innovative Ways Cyberattackers Hunt for Security Bugs

24th April 2021, Kathmandu David “moose” Wolpoff, co-founder and CTO at Randori, talks about lesser-known hacking paths, including unresolved “fixme” flags in developer support groups. Blue teamers are in a constant battle against...
ToxicEye Malware

Telegram Platform Abused in ‘ToxicEye’ Malware Campaigns

23rd April 2021, Kathmandu Hackers are leveraging the popular Telegram messaging app by embedding its code inside a remote access trojan (RAT) dubbed ToxicEye, new research has found. A victim’s computer infected...
Malicious Web Shells

FBI Removes Malicious Web Shells From Microsoft Exchange Servers

23 April 2021, Kathmandu Federal law enforcement, toting a court order, excised malicious web shells from hundreds of exposed servers in the U.S. compromised by the fleecing of zero-day flaws in Microsoft...
Ransomware Gang

Has Babuk Ransomware Gang Attempted a Slam Dunk on Houston Rockets?

22nd April 2021, Kathmandu The Houston Rockets of the National Basketball Association are investigating a cyber-attack against their networks from a relatively new ransomware group that claims to have stolen internal business data....
DDOS Attack

What is DDOS and how can I Better Defend My Business Against this Threat?

22 April 2021, Kathmandu With every step that our world takes into the digital age, the risk of cyber attack becomes a more and more daunting threat. Of the many types of cyberattacks,...
Chinese Cyber-espionage

Behind the Great Firewall: Chinese Cyber-espionage Adapts

19th April 2021, Kathmandu Behind the Great Firewall: Chinese cyber-espionage adapts to the post-Covid world with stealthier attacks Threat intelligence experts quizzed by The Daily Swig said that Chinese state-sponsored attackers are at the forefront of developing...
Steam gaming platform

Pressure Grows on Valve to Unplug Steam Gaming Platform Vulnerabilities

18th April 2021, Kathmandu Stress is rising on video games writer Valve after two units of safety researchers got here ahead with complaints that it has been sluggish at resolving safety flaws...
GitHub Repo

New GitHub Repo Details Legal Threats and Risks Faced by Ethical Hackers

18th April 2021, Kathmandu A new GitHub repository has been created to document and track the times when vulnerability disclosure has gone sour. The Research Threats project details historical legal battles between researchers and the target organizations...