by Liquid Video Technologies | Aug 6, 2021 | Central Monitoring, Cybersecurity, Data Breaches, Hacker, Home Monitoring, Home Protection, Home Security, Malware, Network Security, Networking, Ransomware, Security, Security Breach
An ongoing malicious campaign that employs phony call centers has been found to trick victims into downloading malware capable of data exfiltrations as well as deploying ransomware on infected systems. This campaign is based in India and has been active since last...
by Liquid Video Technologies | Aug 4, 2021 | Access Control, Cybersecurity, Data Breaches, Hacker, Malware, Network Security, People That Make A Difference, Ransomware, Security, Security Breach, Websites
Two new ransomware-as-services (RaaS) programs have appeared on the threat radar this month. These two groups are known as BlackMatter and Haron, and although they are not verified, their emergence is not surprising to anyone who was paying attention. It’s a bit...
by Liquid Video Technologies | Aug 2, 2021 | Cybersecurity, Data Breaches, Hacker, Home Security, Malware, Monitoring, Network Security, Ransomware, Security
Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to swiftly weaponize publically disclosed flaws to their...
by Liquid Video Technologies | Jul 30, 2021 | Business, Cybersecurity, Data Breaches, Hacker, Home Security, Https, Malware, Monitoring, Network Security, Security, Security Breach, Websites
Cybersecurity researchers lifted the lid on a previously undocumented malware strain dubbed, “MosaicLoader” that singles out individuals searching for cracked software as a part of a global campaign. The malware strain installs a Windows utility on...
by Liquid Video Technologies | Jul 28, 2021 | Biometrics, Business, Cybersecurity, Hacker, Home Security, Malware, Monitoring, Network Security, Ransomware, Security, zero trust
Organizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges. One key factor is the password policy. This post discusses problems with end-user password change requests and...
by Liquid Video Technologies | Jul 26, 2021 | Business, Central Monitoring, Cybersecurity, Data Breaches, Hacker, Home Security, Malware, Network Security, Security, Security Breach, Websites
A software package available from the official NPM repository has been revealed to be actually a front for a tool that’s designed to steal saved passwords from the Chrome web browser. It demonstrated this ability by automatically prompting the user to reset...
Recent Comments