by Liquid Video Technologies | Feb 3, 2021 | Cybersecurity, Data Breaches, News, Security, Security Breach
An anonymous researcher identified bugs in the software kernel and WebKit browser engine on Apple iOS that are likely part of an exploit chain. Apple continues to put out potential security fires by patching zero-day vulnerabilities, releasing an emergency update this...
by Liquid Video Technologies | Feb 1, 2021 | Cybersecurity, Data Breaches, Security Breach
Another day, and another report that a cryptocurrency exchange has been breached by malicious hackers. Indian cryptocurrency exchange BuyUCoin says that is investigating claims that sensitive data related to hundreds of thousands of its users has been published on the...
by Liquid Video Technologies | Jan 20, 2021 | Cybersecurity, Data Breaches, Network Security, Networking, Security, Security Breach, Technology News, Uncategorized
Why Designated DNS-over-HTTPS? The U.S. National Security Agency (NSA) on Friday said DNS over HTTPS (DoH) — if configured appropriately in enterprise environments — can help prevent “numerous” initial access, command-and-control, and exfiltration...
by Liquid Video Technologies | Jan 18, 2021 | Cybersecurity, Network Security, Security, Security Breach, Uncategorized
Ensuring the cybersecurity of your internal environment when you have a small security team is challenging. If you want to maintain the highest security level with a small team, your strategy has to be ‘do more with less,’ and with the right technology,...
by Liquid Video Technologies | Jan 15, 2021 | Cybersecurity, Data Breaches, Security Breach
There is no question that attackers are going after your sensitive account data. Passwords have long been a target of those looking to compromise your environment. Why would an attacker take the long, complicated way if they have the keys to the front door? No matter...
by Liquid Video Technologies | Jan 11, 2021 | Cybersecurity, Data Breaches, Hacker, Security Breach
Cybersecurity researchers on Thursday disclosed details of a previously undiscovered in-memory Windows backdoor developed by a hacker-for-hire operation that can execute remotely malicious code and steal sensitive information from its targets in Asia, Europe, and the...
Recent Comments