Blog
Take Cyber Security Seriously
Security policies: remote access programs
The experience of many information security officers shows that only a small portion of security incidents take place as a result of meticulously planned and sophisticated targeted attacks, while most incidents are due to a lack of effective security and control measures. This post begins a series of publications about IT security threats associated with the use of legitimate software.
UK, US, Canada accuse Russia of hacking virus vaccine trials
Britain, the United States and Canada have accused Russia of trying to steal information from researchers seeking a COVID-19 vaccine.
The three nations allege that hacking group APT29, also known as Cozy Bear and said to be part of the Russian intelligence service, is attacking academic and pharmaceutical research institutions involved in coronavirus vaccine development.
Patch your SAP system NOW! Critical flaw allows hackers to breach SAP systems with ease
The vulnerability, which has also been dubbed RECON (Remotely Exploitable Code on NetWeaver), has the highest possible severity rating (10) in the Common Vulnerability Scoring System (CVSS) because it can be exploited over HTTP without authentication and can lead to a full compromise of the system.
Microsoft Emergency Patches - fixes Windows Codecs flaws
All business running Windows servers need to take note of this special vulnerabilities alert!
The attacks (cyber) will come now that it is out!!
Anything connected to Internet Can be Hacked!!
This News articles is posted here to create awareness about Cyber Security!
Cyber Defensive Blog
Cyber Defensive Blog ….
Calling all Subject Matter Expert to Contribute

