Black Hat Hackers – Trying to Hack into their Mindset
Black hat hackers: Most people think that hackers are criminals. It is a common fact that most people don’t know that a broad category of hackers helps us differentiate them…
Talsec, our top suggestion when we talk about In-App security shielding.
Interview with Sergiy Yakymchuk, CEO of Talsec It is a very known fact that an average user uses a lot of apps during the day. All of these applications contain…
Korean start-up knows how to build steel armour against white-hat hacking
“Hacking” is generally understood as malicious activities to break into digital devices, software, and online networks. But Chanam Park’s interest has been particularly focused around white-hat hacking, which is to…
The double face of cryptocurrencies; Wanted or Banned
Cryptocurrencies: Bitcoin and Ethereum are the most popular, but 2022 will be the year of Solana It is almost like going back to the past with a world divided into…
GDPR and Privacy in Asia, interview with Kevin Shepherdson
With the General Data Protection Regulation (GDPR), Europe has become the world’s benchmark for regulations governing people’s right to privacy. The US and Asia are looking at this solution with…
Game Over from the Russian Authorities to the REvil
Game over for REvil, the hacker group that carried out so many prominent cyber-attacks, gaining money and popularity. The collective should not cause any more problems, certainly not with the…
Pirated copies of ‘Spider-Man: No Way Home’ contain malware
Numerous examples of phishing websites where users are asked to give credit card details Pirated copies of ‘Spider-Man: No Way Home’ contain crypto-mining malware and can pose a threat to…
Microsoft’s vaccine for the upcoming 2022 ‘viruses’
Microsoft takes on 2021 cyber threats. With the end of the year 2021, if we take a look back on what it’s left behind, we can witness that cybercrimes have…
Hackers create fake company and hire ‘employees’ for ransomware campaign
The FIN7 cybercrime group created a fake company and hired legitimate programmers as part of its expansion into ransomware. The recruits were unwittingly employed in real life cyberattacks under the…
Hackers are using Cloud accounts for crypto mining
Hackers are using Cloud accounts for crypto mining according to Google, which has released a detailed report on the issue to warn users. The report, entitled ‘Threat Horizons’, is written…