by Liquid Video Technologies | Dec 16, 2020 | Cybersecurity, Network Security, Security
At present, web applications have become the top targets for attackers because of potential monetization opportunities. Security breaches on the web application can cost millions. Strikingly, DNS (Domain Name System) related outage and Distributed denial of service...
by Liquid Video Technologies | Dec 11, 2020 | Cybersecurity, Data Breaches, Hacker, Security, Security Breach, zero trust
Why zero-trust security for email? It has been 20 years since sender identity fraud shifted to the world of email and became known as phishing. In the early days, email threats were largely content-centric and usually included a malicious link or attachment to trick a...
by Liquid Video Technologies | Dec 9, 2020 | Cybersecurity, Data Breaches, Malware, News, Security
Emotet is one of the most dangerous and widespread malware threats active today. Ever since its discovery in 2014—when Emotet was a standard credential stealer and banking Trojan, the malware has evolved into a modular, polymorphic platform for distributing other...
by Liquid Video Technologies | Dec 7, 2020 | Cybersecurity, Data Breaches, Security
In April 2014, the Heartbleed vulnerability hit the internet by surprise. Heartbleed was the name given to the CVE-2014-0160, which was a simple to exploit in Open SSL that allow attackers to view cryptographic keys, login credentials and other private data. Open SSL...
by Liquid Video Technologies | Dec 2, 2020 | Cybersecurity, Data Breaches, News, Security, Security Breach
Cybersecurity researchers today unveiled a complex and targeted espionage attack on potential government sector victims in South East Asia that they believe was carried out by a sophisticated Chinese APT group at least since 2018. “The attack has a complex and...
by Liquid Video Technologies | Nov 30, 2020 | Cybersecurity, Security
Generally, the chief information security officer (CISO) is thought of as the top executive responsible for information security within organizations. However, in today’s remote work environment, the need to expand security beyond one department or the...
Recent Comments