2021- the most fruitful year for hackers- we can say this by looking at the whopping 17 % increase in the number of data breaches in 2021 compared to 2020. In 2022, mobile security will be the top priority for the organization, as mobile devices have become a critical...
Are you a proud owner of an E-commerce store? Worried about the growing eCommerce threats in 2022 that can cause harm to your online business? Fret not! Infosec4TC has in store for you the best online cyber security courses with certificates through which your...
Are you good with computers and are fascinated by mystery codes? Want to pursue a dynamic, competitive job that will test your cyber security skills? If so, it’s time to dawn the white hat and become a penetration tester. The in-demand cyber security job will...
With the shift towards work from home, there has been an influx of new threats, technologies, and business models. Businesses who operate in the online world know that the technology landscape is constantly changing, and enhancing the security within the firm has...
If you are not living under the rock, you will be aware of the cyber security incidents that have created havoc in the business world. Many people think cyber security is a concern for big businesses only; however, hackers don’t look at the firm’s...
-Microsoft Security Updates – December 2021: Microsoft issued fixes for 67 vulnerabilities in a variety of products in today’s security release, including a fix for Windows Defender for IoT, which is vulnerable to CVE-2021-44228 and seven other...
Khonsari Ransomware Deployed by the Log4Shell Vulnerability; A new ransomware family named Khonsari which targets Windows servers has been recently discovered utilizing Log4shell vulnerability to deploy itself. The exploit loads the Java bytecode at...
This is to notify you of the Log4j2 Vulnerability (CVE-2021-42288) that is being exploited in wild. Below is a brief summary of this Vulnerability. -Log4j2 Vulnerability Summary: This exploit makes use of the Apache Log4j2 framework. An attacker injects a Remote code...
Researchers found a set of 13 new vulnerabilities affecting the Nucleus TCP/IP stack, which we are collectively calling NUCLEUS:13. The new vulnerabilities allow for remote code execution, denial of service, and information leak. Nucleus is currently owned by Siemens...