New: cyberthreatAll contenthive-129948hive-196917krzzansteemhive-183959hive-180932photographyhive-166405hive-185836uncommonlablifehive-150122hive-183397hive-144064bitcoinhive-139150hive-188619krsuccesshive-103599hive-124908hive-101145hive-180301hive-109690hive-184714TrendingNewHotLikerscybercourses (28)in ceh • 10 months agoCEH 2024 Threat Report: AI & Cybersecurity InsightsThe digital landscape is constantly shifting, and with it, the tactics and methods employed by cyber threat actors. Staying informed and ahead of the curve is not just a goal but rather a necessity.…yehey (63)in cybersecurity • 2 years agoHow to hunt down and stop cyberthreatsCyberthreats can come from a variety of sources, including malicious software (malware), phishing attacks, and denial-of-service attacks. To protect your computer and your data, you should take…twr (53)in bitcoinmalware • 6 years agoAnatova Ransomware Deemed the Next Big Threat to UsersThe ransomware, Anatova only surfaced earlier this year but is already recognised as the next biggest threat to users. Although it has appeared on a private peer-to-peer network, fears arise from…twr (53)in applevulnerability • 6 years agoMacOS Penetration Test Reveals Three Zero-Day VulnerabilitiesRecently, DropBox undertook a Pen Test to highlight potential vulnerabilities with Mac OS. Syndis, a Cyber Security firm was engaged by DropBox to perform this pen test. The entire process was…uncloak (31)in crypto-jacking • 6 years ago**UK companies are being swamped with undetected crypto-jacking malware**By Emmanuel Marshall 30% of large UK companies were targeted by crypto-jacking cyber-attacks during one thirty day period, according to a recent survey . That staggering figure is a new…uncloak (31)in cyberthreat • 6 years ago**The workflow (and dental health) of testers can be improved**By Phil Jackson Testers are the quality assurance gatekeepers for organisations’ applications. They’re typically meticulous, level-headed people not given to emotional excesses, but if you…twr (53)in cyberattack • 6 years agoIranian Cyber Activity Rising: Leafminer, OilRig Leading the WayOnce again, cybersecurity researchers have Iran in their sights. Symantec, Palo Alto Networks, and German intelligence are all accusing Tehran of numerous cyber campaigns that have recently come to…coinaddic4real (38)in ethereum • 6 years agouncloak : solving Cyber Threat .With the invention of the first personal computer came the problem of cyber threats. As these computers were being used, the problems of hackers who wants to gain entrance into the computer without…gwensarah1 (43)in cyberthreat • 6 years agoReal Time Cyber Threat Detection Using Uncloak Innovative TechnologyC yber attack has risen drastically from the past decade. This is majorly because of the increase in devices that's are connected to the internet, the IoT, smart cities and mass digitalization.…yourcryptonews (29)in uncloak • 7 years agoUncloak - When safe is not enough!Does any of you remember the last year’s WannaCry ransomware attack ? I bet you do! What if this could have been stopped, or at least its devastating effects diminished? You don’t have to imagine…dhamiez (25)in mining • 7 years agoForget viruses or spyware—your biggest cyberthreat is greedy currency minersThe practice of surreptitiously mining cryptocurrency on other people’s hardware is becoming pervasive, overtaking ransomware as a tool of choice for extorting money online. This week…zeroshiki (56)in technology • 7 years agoKaspersky Cyberthreat real-time mapdigipreneur1 (32)in hacking • 7 years agoHacking threat to Virgin Media Super Hub 2 Router and other devicesAfter investigation, Virgin Media has advised about 800,000 users of its Super Hub 2 router, to change their router and network passwords, if they are still using the default ones set originally.…