BlackMatter Group Demands

BlackMatter Group Demands $5.9 Mn Ransom After Attacking NEW Cooperative

28th September 2021, Kathmandu The Biden administration is trying to investigate ransomware attacks, attackers are targeting the critical infrastructures in the country. The farm services provider is the latest victim of ransomware...
Cyber Attacks in India

144496 Cyber Attacks in India in the Last Three Years

28th September 2021, Kathmandu According to the Indian Parliament, over a million cyber attacks were reported in the last three years. The data, which was collected by the CERT division of India,...
Ransomware Attacks

Conti Ransomware Attacks on Rising – CISA, FBI, NSA Issue Joint Alert

27th September 2021, Kathmandu According to the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), the Conti ransomware attacks have increased in the U.S and international organizations. With...
Cybersecurity Compliance

New Cyber Campaign “Armor Piercer” Targets Indian Government Officials

27th September 2021, Kathmandu Cyberattacks and malicious campaigns are increasing in a rapid way. According to research from Cisco Talos shows a cyber-campaign, tracked as Armor Piercer, targeting the government and defense...
Singapore Businesses

Singapore Businesses Struggling to Cope with Network and Ransomware Attacks

24th September 2021, Kathmandu Cybersecurity standards remain a serious concern for organizations as Singapore is expanding its digital transformation capabilities. According to Barracuda Networks, network and ransomware attacks have become a hurdle...

Ongoing Credential Harvesting Campaign Targets Government Agencies in APAC

24th September 2021, Kathmandu Ongoing Credential Harvesting Campaign Targets Government Agencies in APAC, EMEA Security researchers found an issue of credential harvesting campaigns targeting government agencies across seven countries in the Asia-Pacific (APAC),...
Digital Forensics Career

6 Fundamental Skills Required Pursuing a Career in Digital Forensics

22nd September 2021, Kathmandu Digital forensics is a better career path to grow in 2021 and beyond. The cybercriminal's malicious activities are giving trouble to the digital forensics specialists. Attackers these days...
State of Cryptocurrency

How to Keep Your Crypto Wallet Safe? Cryptocurrency is illegal in Nepal

14th September 2021, Kathmandu Are you trying to keep your Crypto wallet safe? Also, do you know Cryptocurrency is illegal in Nepal? Let’s find out the detail in this article below. Cryptocurrency is...
Network Protocols

What are Network Protocols and How Are They Used?

13th September 2021, Kathmandu Network Protocols are the set of rules for formatting and processing data. Network Protocols are used for communication between different devices. These rules explain how data and information...
CISSP Certification Training

CISSP Certification Training in Kathmandu Nepal

11th September 2021, Kathmandu CISSP (Certified Information Systems Security Professional) Certification Training in Kathmandu Nepal Are you looking to take training for CISSP certification in Kathmandu Nepal? If yes, you have landed on...
Internet Safety Tips

8 Internet Safety Tips for Kids on How to Safe Online

9th September 2021, Kathmandu What is online safety? Simply, online safety is the act of staying safe online. Which is commonly referred to as internet safety, e-safety, and cyber safety. Online safety is about...
Ransomware solutions

Ransomware Recovery Solutions in Nepal

8th September 2021, Kathmandu OneCover Private Limited is now providing ransomware solutions in Nepal. OneCover with its fellow company, Scrutiny Ransomware Solution is now all set to provide ransomware solutions to all the...
Cybersecurity Jobs in Demand as Data Privacy

Most Common Types of Network Security Attacks Explained

6th September 2021, Kathmandu The peril of network security attacks is mounting as businesses transition to a remote work environment and embrace sophisticated technology. The IT (Information Technology) and security professionals’ roles are...
Ransomware Resiliency

Ransomware Vulnerabilities That Could Bring Down Your Organization

6th September 2021, Kathmandu Today, 266 susceptibilities are associated with ransomware, and assailers are increasingly exploiting these impuissances to launch devastating ransomware attacks. Ergo, identifying and remediating these susceptibilities needs to be...
Exploiting Atlassian Confluence Flaw

U.S. Cyber Command Warns of Ongoing Attacks Exploiting Atlassian Confluence Flaw

5th September 2021, Kathmandu The U.S. Cyber Command on Friday admonished of perpetual mass exploitation endeavors within the wild targeting a now-patched critical security susceptibility affecting Atlassian Confluence deployments that would be abused by unauthenticated assailants to...
New Malware Family

This New Malware Family Using CLFS Log Files to Avoid Detection

5th September 2021, Kathmandu Cybersecurity researchers have disclosed details about an incipient malware family that relies on the Mundane Log File System (CLFS) to obnubilate a second-stage payload in registry transaction files...
WhatsApp Photo Filter Bug

WhatsApp Photo Filter Bug Could Have Exposed Your Data to Remote Attackers

4th September 2021, Kathmandu A now-patched high-astringency security susceptibility in WhatApp's image filter feature could have been abused to send a malignant image over the messaging app to read sensitive information from...
Monetize Malware

Cybercriminals Abusing Internet-Sharing Services to Monetize Malware Campaigns

3rd September 2021, Kathmandu Threat actors are capitalizing on the growing popularity of proxy war platforms like Honeygain and Nanowire to monetize their own malware campaigns, once again illustrating how assailants are...
Disable Fortress Wi-Fi Home Security

Attackers Can Remotely Disable Fortress Wi-Fi Home Security Systems

3rd September 2021, Kathmandu Incipient susceptibilities have been discovered in Fortress S03 Wi-Fi Home Security System that could be potentially abused by a malevolent party to gain unauthorized access with an aim...
Delhi High Court WhatsApp

Delhi High Court to Hear Appears to Facebook and WhatsApp in October in Privacy...

1st September 2021, Kathmandu Delhi high court to hear appears to Facebook and WhatsApp in October in privacy policy matters. The Delhi supreme court verbalized it'll auricularly discern in October the appeals of...
LockFile Ransomware

LockFile Ransomware Bypasses Protection Using Intermittent File Encryption

29th August 2021, Kathmandu An incipient ransomware family that emerged last month comes with its own bag of artifices to bypass ransomware aegis by leveraging a novel technique called "intermittent encryption." Called LockFile,...
Microsoft Phishing Attacks

Microsoft Warns of Widespread Phishing Attacks Using Open Redirects

29th August 2021, Kathmandu Microsoft is an admonishment of a widespread credential phishing campaign that leverages open redirector links in email communications as a vector to illude users into visiting malevolent websites...
PCI DSS Prevent

What are Supply Chain Attacks by cybersecurity?

28th August 2021, Kathmandu Today, a growing number of hackers are adopting sophisticated implements and techniques to assail a company’s Supply Chain Management and wreak havoc in business operations. In today’s evolving digital...
Biden Administration

Biden Administration and Tech Giants Come Together to Raise Bar on Cybersecurity

28th August 2021, Kathmandu To address the ascending cyber threat landscape in the U.S., Biden Administration and tech giants such as Google, Microsoft, Apple, and IBM, have converged to ameliorate the security...
Cisco Critical Fixes

Cisco Issues Critical Fixes for High-End Nexus Gear

28th August 2021, Kathmandu Networking giant issues two critical patches and six high-rigor patches. Cisco Systems relinquished six security patches tied to its high-end 9000 series networking gear ranging in paramountcy from critical,...
Win10 Admin Rights Tossed

Win10 Admin Rights Tossed Off by yet another Plug-In

28th August 2021, Kathmandu Then again, you don’t even require the authentic contrivance, in this case, a SteelSeries peripheral since emulation works just fine to launch with full SYSTEM rights. It’s not just...
Shiny Hunters Cyber Crime Group

Researchers Detail Modus Operandi of Shiny Hunters Cyber Crime Group

25th August 2021, Kathmandu ShinyHunters, a notorious cybercriminal underground group that's been on a knowledge breach spree since last year, has been optically canvassed probing companies' GitHub repository ASCII text file for susceptibilities which will be abused to...
Microsoft Power Apps

38 Million Records Exposed from Microsoft Power Apps of Dozens of Organizations

25th August 2021, Kathmandu More than 38 million records from 47 different entities that believe Microsoft's Potency Apps portals platform were inadvertently left exposed online, bringing into sharp focus an "incipient vector...
users-dangerous-hackers

Users Can Be Just As Dangerous As Hackers

12th August 2021, Kathmandu Among the quandaries stemming from our systemic failure with cybersecurity, which ranges from decenniums-old software-development practices to Chinese and Russian cyber-attacks, one quandary gets far less attention than...
Bugs in DNS Services

Bugs in Managed DNS Services Cloud Let Attackers Spy on DNS Traffic

12th August 2021, Kathmandu Cybersecurity researchers have disclosed an incipient class of susceptibilities impacting major DNS-as-a-Accommodation (DNSaaS) providers that could sanction assailers to exfiltrate sensitive information from corporate networks. "We found a simple...