Cyber Security Trends |24 June 19
Hello, we are talking about Florida paying 600K USD for Ransomware and Disney actress Bella Thorne posted private photos on Twitter because of a hacker blackmail. Below are the linksRead More →
Hello, we are talking about Florida paying 600K USD for Ransomware and Disney actress Bella Thorne posted private photos on Twitter because of a hacker blackmail. Below are the linksRead More →
A new security incident shakes this social network The social network Twitter has just announced the finding of a security flaw that provoked public exposure of the supposedly privacy protectedRead More →
The suspect claimed to be annoyed by recent statements by some of those involved in leaking information According to reports of cybersecurity and digital forensics specialists from the International InstituteRead More →
Metadata contained in old posts contains precise location coordinates According to a research carried out by cybersecurity specialists, the location metadata contained in the social network Twitter posts may beRead More →
Identify malicious content on platforms such as Facebook, Twitter, etc. The frequency with which viruses appear on social network platforms has increased as well as the dangerousness of these maliciousRead More →
The social network mentions that it has collected evidence suggesting that a government might be behind this attack Cybersecurity specialists from the International Institute of Cyber Security report that, afterRead More →
A team of researchers has discovered a new way to hide malicious software The investigators of a cybersecurity firm reported the discovery of a new malware sample capable of retrievingRead More →
How to do a security check on this social network Have you ever wondered if someone has accessed your Twitter account in an illegitimate way? Do you know when andRead More →
Facebook and Twitter report having suspended or banned accounts linked to Iran and Russia campaigns Over 650 Facebook pages and groups that had been identified as “misleading” by their cyber security organization teams haveRead More →
Pentest specialists argue that social platforms can be a tool used for psychological warfare operations (PSYOPS) and malicious web campaigns, which is why Twitter has implemented new security features to identify andRead More →