First android ransomware reported
The Cyberoam Internet Threats Trends Report for Q2 2014, prepared in collaboration with CYREN, is out. While attacks on the Android operating system continued to predominate this quarter, the big news...
View ArticleVulnerability Alert – Use-After-Free condition detected in Mozilla Firefox
A use-after-free condition affects Mozilla Firefox and can lead to a potential crash on a successful exploit. The condition currently affects Mozilla Foundation Thunderbird prior to 31.1, Mozilla...
View ArticleMalware Alert – Apple OS X affected by XSLCmd Backdoor
An APT backdoor named “Backdoor.MacOS.Xslcmd.A” has been found affecting all Apple OS X systems. It has been seen that the malware contacts a remote server to receive commands to execute on the...
View ArticleA Mail to Kill: Norway Oil and Energy Industry in midst of A Massive Cyber...
Norway State authorities have warned 300 companies specifically from the oil and energy industry, of being targeted by a coordinated hacker attack[1]. The incident was reported by the local newspaper...
View ArticleCyber Espionage Hits Community Health System Inc.
Personal data belonging to 4.5 million American hospital patients stolen One of the biggest U.S. hospital groups Community Health Systems Inc. has admitted of being victimised of a cyber-attack,...
View ArticleApple Users Becoming #1 Target
The Cyberoam co-branded CYREN Internet Threats Trend report for Q3 is out! Download your copy right away! The report highlights an unusual rise in attacks on Apple platforms, along with CYREN analytics...
View ArticleAn exclusive security outlook for the year to come -2015!
Cyberoam publishes Security Predictions for 2015 Network Security has been evolving at an astounding rate, and so are the threat trends, with cybercriminals finding innovative and newer ways to exploit...
View ArticleSpooky ‘Ghost Vulnerability’ (CVE-2015-0235) keeps Linux users on guard
A buffer overflow vulnerability has been discovered that can allow an attacker to remotely execute code on a Linux computer. It was found in the GNU C Library (glibc)__nss_hostname_digits_dots()...
View ArticleBig Opportunities for Cyber Security in Big Data
The US Department of Homeland Security (DHS) is working on an ambitious project which a DHS official reportedly claims is about creating “Weather Maps” for cyber threats. The agency hopes to develop...
View ArticleThird Party Vendors – The Weak Links in Network Security
“Your cybersecurity is only as good or bad as that of your vendors.” By 2019, the cyber security market will be worth a mammoth $155.74 billion. The market for next generation security appliances like...
View Article