The US Will Introduce A Cyber Army Into Its Military Units

The US Will Introduce A Cyber Army Into Its Military Units

By 2030 the US plans to double the size of its military cyber units. The Pentagon prepares for future battles that will involve military operations on the cyber field. The plans include the increase of Cyber Mission Force Groups up to 6,000 people and the number of employees of army units, reservists and the National… Continue reading The US Will Introduce A Cyber Army Into Its Military Units

Iranian Spear-Phishing Operation Targets US And Israeli High Executives

Iranian Spear-Phishing Operation Targets US And Israeli High Executives

In a wake of rising tensions between Israel and Iran, researchers from Check Point Research (CPR) discovered numerous attempts of spear phishing attacks from the supposedly Iranian Phosphorus APT group. Researchers also assume that the activity might have been conducted earlier, but so far they traced back it to at least December 2021. It is… Continue reading Iranian Spear-Phishing Operation Targets US And Israeli High Executives

TOP DNS Attacks Types

What is a DNS (Domain Name Server) Attack? A DNS attack is the situation when an attacker either attempts to compromise a DNS network or uses its inherent attributes to conduct a broader attack. A well-orchestrated DNS attack can cause severe damage to an organization. DNS is the main form of communication. It receives domains… Continue reading TOP DNS Attacks Types

BlackCat Ransomware Attacks Italian University

An Italian university was hit by BlackCat this week. The hackers demand a $4.5 million ransom. BlackCat is a new, but very potent ransomware gang that carries several distinctive features that make it harder to detect and prevent. About BlackCat ransomware BlackCat ransomware is not a newbie on the ransomware scene, however, it is far… Continue reading BlackCat Ransomware Attacks Italian University

Difference Between Phishing and Pharming

Pharming, Phishing, Phishing attack

Intruders try to keep up with the development in the digital world. The technology seeks to provide users with more effective resources, but the attackers in turn try to come up with even more sophisticated methods of cyberattacks. The two types of attack are Phishing and Pharming. Here we consider their characteristics and the difference… Continue reading Difference Between Phishing and Pharming

Smishing And Vishing: Differences To Know About Phishing Attacks

You can say it has become much easier for various criminals to get to their victims and target them with different schemes. And all because of the ubiquitous internet these days. You’ve probably heard the word ‘phishing‘. Today not only specialists from the cybersecurity field are actively talking about it but also ordinary users often… Continue reading Smishing And Vishing: Differences To Know About Phishing Attacks

Is It Safe to Use a Password Manager in 2022?

What’s the Idea Behind Password Managers? In the cybersecurity world, everyone knows that passwords are real. It’s only in the movies hackers can effortlessly detour or hack passwords. A strong password provides decent data protection. Since an average internet user nowadays has many accounts on different online services, remembering passwords becomes a serious nuisance. Using… Continue reading Is It Safe to Use a Password Manager in 2022?

Dangerous Injection Attacks

Today, Injection attacks are a significant problem and top the list of vulnerabilities. There are good reasons for this. They are dangerous. Injection attacks exploit various vulnerabilities to deliver untrusted user input, which is then executed by the web application. This is why they are a threat to the web application industry. Using the injection… Continue reading Dangerous Injection Attacks