Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks

What is a spoofing attack? Types of spoofing and prevention measures

Spoofing attacks are on the rise. What is a spoofing attack, you ask? Essentially, it attempts to gain unauthorised access to systems, devices or networks by masquerading as a valid user. In other words, spoofing attackers try to mimic or copy the behaviour of authorised users to steal information or gain access.

Killnet Cyber Attacks Against Italy and NATO Countries

On May 11, several Italian institutional websites, including the Italian Senate, the Ministry of Defense, and the National Institute of Health, were taken offline and unreachable for a few hours. This was day one of a multiday cyber attack, which targeted other Italian websites as well as other countries.

Sponsored Post

Ransomware Attacks: How They Happen, the Threats and Risks

Ransomware attacks are on the rise, and businesses need to be aware of the dangers they pose. In this blog post, we will discuss how ransomware attacks take place, the threats they pose, and the aftermath for businesses. We will also provide tips for protecting your business from ransomware attacks. If you prefer a watch over a read, our consultant breaks Ransomware down in the video below.

CRLF Injection Attack Explained

Web applications across the digital world are teeming with vulnerabilities increasingly equipped to defeat security mechanisms. Among them are injection attacks. We are aware of the many injection vulnerabilities present in a web application, for example, SQL injection, HTML injection, CRLF injection, cross-site scripting and many others. This article will discuss CRLF injection vulnerability in detail for web application security.

New Typosquating Attack on npm Package 'colors' Using Cross language Technique Explained

All developers are prone to mistakes that leave them open to typosquatting attacks. Tiredness, dirty keyboard, or software issues may lead to typing some letters twice. Everyone would like to see a red screen and alarm coming out of the computer in such a case, but sadly, it doesn’t always work that way with most supply chain attacks.

Cloud Threats Memo: What We Can Learn From the Top 15 Routinely Exploited Threats of 2021

Have you ever wondered what vulnerabilities are exploited the most by threat actors? The answers you have been eagerly waiting for could be found inside a joint Cybersecurity Advisory (CSA) coauthored by the cybersecurity authorities of the United States (CISA), Australia (ACSC), Canada (CCCS), New Zealand (NZ NCSC), and the United Kingdom (NCSC-UK), plus the U.S. National Security Agency (NSA) and Federal Bureau of Investigation (FBI).