by Liquid Video Technologies | Jul 12, 2021 | Business, Malware, Security, Security Breach, Websites
A malicious campaign that set its sights on industrial-related entities in the Middle East since 2019 has surfaced with an upgraded malware toolset, called WildPressure, to strike both Windows and macOS operating systems, symbolizing expansion in both its targets and...
by Liquid Video Technologies | Jul 9, 2021 | API, Cybersecurity, Home Security, Network Security, Security, Websites
Securing applications it the API-first era can be an uphill battle. As development accelerates, accountability becomes unclear, and getting controls to operate becomes a challenge in itself. It’s time that we rethink our application security strategies to...
by Liquid Video Technologies | Jul 7, 2021 | Business, Central Monitoring, Cybersecurity, Data Breaches, Hacker, Malware, Network Security, Ransomware, Security, Security Breach, Websites
The recent influx of ransomware attacks has brought to life fears of downtime and data loss cybersecurity pros have warned about, as attacks on the energy sector, food supply chain, healthcare industry, and other critical infrastructure have grabbed headlines. The...
by Liquid Video Technologies | Jul 5, 2021 | Crime, Drama, Cybersecurity, Data Breaches, Hacker, Https, Malware, Monitoring, Network Security, People That Make A Difference, Security, Security Breach
A group of hacktivists and activists have published 269 GB of data leaked and allegedly stolen from more than 200 police departments, fusion centers and other law enforcement agencies across the United States. This includes the login credentials for 32 police domains....
by Liquid Video Technologies | Jul 2, 2021 | Cybersecurity, Data Breaches, Hacker, Malware, Ransomware, Security, Security Breach, Websites
Organizations today are overwhelmed by the number of dangers and threats to look out for. From span to phishing attempts to new infiltrating and ransomware tactics. This research investigates methods that are currently being employed by cyber groups to generate...
by Liquid Video Technologies | Jun 30, 2021 | Biometrics, Central Monitoring, Cybersecurity, Hacker, Https, Malware, Network Security, Security, Security Breach
The traditional model of online identity, username/password, has long outlived its usefulness. This is how API multifactor or two-factor authentication has come into play, to patch up vulnerabilities of the so-called knowledge-based model, usually by SMS passcode to...
Recent Comments