by Liquid Video Technologies | Jan 4, 2021 | Cybersecurity, Data Breaches, News, Security Breach
FireEye, one of the largest cybersecurity firms in the world, said on Tuesday it became a victim of a state-sponsored attack by a “highly sophisticated threat actor” that stole its arsenal of Red Team penetration testing tools it uses to test the defenses...
by Liquid Video Technologies | Jan 1, 2021 | Cybersecurity, Data Breaches, News
Critical flaws in a core networking library powering Valve’s Steam online gaming functionality could have allowed malicious actors to remotely crash games and even take control over affected third-party game servers. “An attacker could remotely crash an...
by Liquid Video Technologies | Dec 18, 2020 | Cybersecurity, Data Breaches, News, Security Breach
Two popular Android apps from Chinese tech giant Baidu were temporarily unavailable on the Google Play Store in October after they were caught collecting sensitive user details. The two apps in question—Baidu Maps and Baidu Search Box—were found to collect device...
by Liquid Video Technologies | Dec 11, 2020 | Cybersecurity, Data Breaches, Hacker, Security, Security Breach, zero trust
Why zero-trust security for email? It has been 20 years since sender identity fraud shifted to the world of email and became known as phishing. In the early days, email threats were largely content-centric and usually included a malicious link or attachment to trick a...
by Liquid Video Technologies | Dec 9, 2020 | Cybersecurity, Data Breaches, Malware, News, Security
Emotet is one of the most dangerous and widespread malware threats active today. Ever since its discovery in 2014—when Emotet was a standard credential stealer and banking Trojan, the malware has evolved into a modular, polymorphic platform for distributing other...
by Liquid Video Technologies | Dec 7, 2020 | Cybersecurity, Data Breaches, Security
In April 2014, the Heartbleed vulnerability hit the internet by surprise. Heartbleed was the name given to the CVE-2014-0160, which was a simple to exploit in Open SSL that allow attackers to view cryptographic keys, login credentials and other private data. Open SSL...
Recent Comments