by Noel Mathew | Aug 26, 2017 | Cyber Attacks, Malware
Researchers from the University of Washington say they have successfully hacked into a computer using custom strands of DNA for the first time. The researchers used the life-encoding molecule to attack and take over a computer, using strands of DNA to transmit a...
by Mufeed Ubaid | Aug 25, 2017 | Cyber Attacks, Cyber Security, Malware, Ransomware
Mamba – The Disk Encrypting Ransomware Last November of 2016, the Mamba ransomware was first detected in public attacks against the San Francisco Municipal Transportation Agency, encrypting the hard drives, leaving its internal computer and payment systems on halt....
by Noel Mathew | Aug 25, 2017 | SOC
What is PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal...
by Tijo Davis | Aug 24, 2017 | Malware, Petya / NotPetya, Ransomware, Wannacry
In May 2017, malware outbreak such as WannaCry and Petya / NotPetya infected both enterprises and individuals across the globe. All data on the infected system were encrypted and the demanded ransom was $300 for the decryption key. Within a day, this outbreak was...
by Arun Thomas | Aug 20, 2017 | Cyber Security, SIEM, SOC
In the current era of security threat attacks and cyber warfare, it comes as a vital need to persistently monitor and scrutinize the ongoing threats and day-to-day malicious activities. An essential component of threat intelligence analysis at any level is the...
Recent Comments