by Liquid Video Technologies | Jul 30, 2021 | Business, Cybersecurity, Data Breaches, Hacker, Home Security, Https, Malware, Monitoring, Network Security, Security, Security Breach, Websites
Cybersecurity researchers lifted the lid on a previously undocumented malware strain dubbed, “MosaicLoader” that singles out individuals searching for cracked software as a part of a global campaign. The malware strain installs a Windows utility on...
by Liquid Video Technologies | Jul 28, 2021 | Biometrics, Business, Cybersecurity, Hacker, Home Security, Malware, Monitoring, Network Security, Ransomware, Security, zero trust
Organizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges. One key factor is the password policy. This post discusses problems with end-user password change requests and...
by Liquid Video Technologies | Jul 26, 2021 | Business, Central Monitoring, Cybersecurity, Data Breaches, Hacker, Home Security, Malware, Network Security, Security, Security Breach, Websites
A software package available from the official NPM repository has been revealed to be actually a front for a tool that’s designed to steal saved passwords from the Chrome web browser. It demonstrated this ability by automatically prompting the user to reset...
by Liquid Video Technologies | Jul 23, 2021 | Access Control, Biometrics, Business, Cybersecurity, Data Breaches, Hacker, Https, Malware, Monitoring, Network Security, Security, Security Breach, Websites
Password security was a problem even before the advent of widespread remote work. So, what happened post-pandemic? We developed new and creative approaches to password security that will help you safeguard your accounts. We also created five critical password security...
by Liquid Video Technologies | Jul 21, 2021 | Cybersecurity, Data Breaches, Hacker, Malware, Network Security, Networking, News, Security, Websites, zero trust
Threat intelligence researchers from Google on Wednesday shed more light on four in the wild zero-day flaws in Chrome, Safari, and Internet Explorer browsers that were exploited by malicious actors in different campaigns since the start of the year. The four flaws...
Recent Comments