Uncategorized

Rëndësia e sigurisë kibernetike për bizneset

Rëndësia e sigurisë kibernetike për bizneset Rëndësia e sigurisë kibernetike në biznes nuk duhet të anashkalohet kurrë, pasi nga viti në vit, sulmet në internet po rriten çdo dite e më shume në të gjithë globin. Sipas statistikave, sa më i madh të jetë biznesi, aq më shumë ka të ngjarë të pesoni nga një…

Hacker News

Ransomware Gangs to Stop Attacking Health Organisations During Pandemic

Some Ransomware operators have stated that they will no longer target health and medical organizations during the Coronavirus (COVID-19) pandemic. Last night, BleepingComputer reached out to the operators of the Maze, DoppelPaymer, Ryuk, Sodinokibi/REvil, PwndLocker, and Ako Ransomware infections to ask if they would continue targeting health and medical organizations during the outbreak. Below is what…

Findbug News - Hacker News

Wiper Malware Called “Coronavirus” Spreads Among Windows Victims

Wiper Malware Called “Coronavirus” Spreads Among Windows Victims Like NotPetya, it overwrites the master boot record to render computers “trashed.” A new Windows malware has emerged that makes disks unusable by overwriting the master boot record (MBR). It takes its cue from the COVID-19 pandemic, calling itself simply “Coronavirus.” Overwriting the MBR is the same…

Uncategorized

3 REASONS WHY YOUR COMPANY SHOULD INVEST IN CYBER SECURITY

3 REASONS WHY YOUR COMPANY SHOULD INVEST IN CYBER SECURITY In a business world were digitization and customers’ privacy are key, safeguarding data has become a real must. Facebook, Ticketmaster, Adidas, Orange… the image of these companies was severely damaged after a security breach became public knowledge. Here are 3 key reasons that explain why…

Uncategorized

Top 10 Dangerous DNS Attacks Types and The Prevention Measures

Top 10 Dangerous DNS Attacks Types and The Prevention Measures DNS stands for Domain Name System which remains under constant attacks, and thus we can assume there is no end in sight because the threats are growing increasingly nowadays. DNS generally uses UDP fundamentally and in some cases, uses TCP as well. When it uses…

Uncategorized

5 of the Biggest Cyber Security Risks for Businesses

5 of the Biggest Cyber Security Risks for Businesses Events of recent times have pushed cyber security practices to the front of many businesses’ minds — and not before time. With stories like the WannaCry outbreak and Equifax breach hitting headlines this year, the major impacts that can be caused by lax cyber security practices…

Uncategorized

The Biggest Cybersecurity Risks in 2020

The RSA Conference is the world’s biggest and most respected gathering of CISOs, technologists and cybersecurity specialists. As a new decade draws upon us — and as the next conference convenes in February in San Francisco — a new set of challenges is here. Sifting through 500 or so submissions from cybersecurity experts eager to…

Uncategorized

Warning — Unpatched Critical ‘Wormable’ Windows SMBv3 Flaw Disclosed

Warning — Unpatched Critical ‘Wormable’ Windows SMBv3 Flaw Disclosed Shortly after releasing its monthly batch of security updates, Microsoft late yesterday separately issued an advisory warning billions of its Windows users of a new critical, unpatched, and wormable vulnerability affecting Server Message Block 3.0 (SMBv3) network communication protocol. It appears Microsoft originally planned to fix…

Uncategorized

One billion Android devices at risk of hacking

One billion Android devices at risk of hacking More than a billion Android devices are at risk of being hacked because they are no longer protected by security updates, watchdog Which? has suggested. The vulnerability could leave users around the world exposed to the danger of data theft, ransom demands and other malware attacks. Anyone…

Uncategorized

Disa nga hapat për të siguruar biznesin apo platformën tuaj në hapësirën kibernetike

Disa nga hapat për të siguruar biznesin apo platformën tuaj në hapësirën kibernetike Shumica e bizneseve të vogla dhe të mesme kanë tendencë të kenë një ide të gabuar se për shkak të madhësisë së tyre, hakerat do të jenë më pak të interesuar për ta dhe përkundrazi do të preferojnë të synojnë ti sulmojnë…