• Home
  • About Us
    • Contact Us
  • Jobs
  • Blog
  • Offers
  • Join Us
  • Cyber Career

    Cart

    No products in the cart.

    Sign in

    Cart

    No products in the cart.


    • Home
    • About Us
      • Contact Us
    • Jobs
    • Blog
    • Offers
    • Join Us
    • Cyber Career
    Sign in

    Month: April 2020

    Covid 10 Cyber Attacks

    Microsoft defends health care orgs, Mozilla funds innovation to fight COVID-19

    Some welcome good news on the COVID-19 front: Microsoft Corporation said it is stepping up its efforts to protect hospitals and other critical services from…

    Daz April 5, 2020
    0 Comments
    forensic investigator image

    Spearphishing Campaign Exploits COVID-19 To Spread Lokibot Infostealer

    The attack discovered uses World Health Organization trademark to lure users with info related to coronavirus. Researchers have discovered threat actors once again capitalizing on…

    Daz April 5, 2020
    0 Comments

    Marriott data breach again – affects 5.2 million guests

    Marriott Hotels have disclosed another data breach, in which details approximately 5.2 million guests were leaked. Internal investigation by the hotel says the guest information…

    Tony April 2, 2020
    0 Comments

    Zoom Removes Data-Mining LinkedIn Feature

    The feature, criticized for “undisclosed data-mining,” is only the latest privacy faux pas for Zoom this month. Zoom has nixed a feature that came under…

    Tony April 2, 2020
    0 Comments

    RSS Threat Post

    • ZuoRAT Can Take Over Widely Used SOHO Routers June 30, 2022
      Devices from Cisco, Netgear and others at risk from the multi-stage malware, which has been active since April 2020 and shows the work of a sophisticated threat actor.
      Elizabeth Montalbano
    • A Guide to Surviving a Ransomware Attack June 30, 2022
      Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.
      Oliver Tavakoli
    • Leaky Access Tokens Exposed Amazon Photos of Users June 29, 2022
      Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents.
      Nate Nelson
    • Patchable and Preventable Security Issues Lead Causes of Q1 Attacks June 29, 2022
      Attacks against U.S. companies spike in Q1 2022 with patchable and preventable external vulnerabilities responsible for bulk of attacks.
      Sagar Tiwari
    • Top Six Security Bad Habits, and How to Break Them June 28, 2022
      Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.
      Infosec Contributor

    Search

    Tags

    Language

    Archives

    • July 2020 (1)
    • April 2020 (4)

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    • Home
    • About Us
    • Jobs
    • Blog
    • Offers
    • Join Us
    • Cyber Career
    Copywrite © 2022 - Cyber Training Camps All rights reserved. All company names or logos are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.