by Liquid Video Technologies | Sep 1, 2021 | Cybersecurity, Data Breaches, Hacker, Home Protection, Home Security, Malware, Monitoring, Network Security, Ransomware, Security, Security Breach, Websites
Simple Mail Transfer Protocol or SMTP has easily exploitable security loopholes. Email routing protocols were designed in a time when cryptographic technology was at a nascent stage (e.g., the defacto protocol for email transfer, SMTP, is nearly 40 years old now), and...
by Liquid Video Technologies | Aug 30, 2021 | Business, Cybersecurity, Data Breaches, Hacker, Home Security, Malware, Network Security, Ransomware, Security, Security Breach, Websites
Google and Microsoft said they are pledging to invest a total of $30 billion in cybersecurity advantages over the next five years, as the U.S. government partners with private sector companies to address threats facing the country in the wake of a string of...
by Liquid Video Technologies | Aug 27, 2021 | Business, Central Monitoring, Cybersecurity, Data Breaches, Hacker, Malware, Network Security, Networking, People That Make A Difference, Ransomware, Security, Security Breach
A Nigerian cybercrime threat actor has been observed attempting to recruit employees by offering them to pay $1 million in bitcoins to deploy Black Kingdom ransomware on companies’ networks as part of an insider threat scheme. At the beginning of October, a...
by Liquid Video Technologies | Aug 18, 2021 | Business, Central Monitoring, Cybersecurity, Data Breaches, Hacker, Home Security, Https, Malware, Monitoring, Network Security, Ransomware, Security, Security Breach, Websites
News and commentary on ransomware have hit a fever pitch with recent, high-profile attacks against global software management provider Kaseya, gas supplier Colonial Pipeline, popular Cape Cod ferry service, The Steamship Authority, and JBS, the world’s largest...
by Liquid Video Technologies | Aug 16, 2021 | Business, Central Monitoring, Cybersecurity, Data Breaches, Hacker, Job Performance, Malware, Network Security, Security Breach
Among the problems stemming from our systematic failure with cybersecurity, which ranges from decades-old software-development practices to Chinese and Russian cyber-attacks, one problem gets far less attention than it should – the insider threat....
by Liquid Video Technologies | Aug 13, 2021 | Cybersecurity, Hacker, Malware, People That Make A Difference, Ransomware, Security
Multiple cybercriminals are leveraging a malware-as-a-service (MaaS) solution to distribute a wide range of malicious software distribution campaigns that result in the deployment of payloads such as Campo Loader, Hancitor, IcedID, QBot, Buer Loader, and SocGholish...
Recent Comments