All organizations and users who are using Mikrotik routers are urged to review and make sure that all patch releases are already applied to their devices. Patching your outdated Mikrotik routers and other devices’ versions will minimize any risks of getting injected with cryptojacking malware on your system. CERT-PH recommends assigning a personnel to monitor the official blog website continue reading : Mikrotik Vulnerability
A Remote Command Execution (RCE) vulnerability (CVE-2019-10149) in the open source Exim mail transfer agent (MTA) implemented in Unix-based mail servers was publicly disclosed. The vulnerability can be exploited through a malicious email sent to a vulnerable server, and injected commands will typically run as root. This is due to improper validation of the recipient continue reading : Exim Vulnerability (CVE-2019-10149)
The increasing pace of the possibilities provided by internet services has become an aide for businesses and opportunities to maximize the use of the internet. Our assets rely heavily on the use of the internet, the same field where hackers and cyber criminals rely on to enact their illicit deeds. As convenient and helpful the continue reading : Secure your digital assets from cyberattacks
When you post or send anything online, expect that someone has seen it and might even save it for his perusal. Nowadays, people’s idea of documenting themselves is evolving and the idea of recording your daily life thru social media has become a habit. It comes to the point that others become comfortable of sharing continue reading : YOU MIGHT BE AT RISK: Practices that lead to Sextortion
Since the start of 2018, Internet Fraud has been in the top of our Cybercrime Statistics Reports proving that it has become more and more prevalent. Internet fraud is the act of defrauding people of their money through internet services. This type of fraud can happen in a variety of ways. One of the growing continue reading : How is Social Media Fraud Orchestrated