Cybertrend Media.

  • Home
  • Cybertrend Media.

Cybertrend Media. Contact information, map and directions, contact form, opening hours, services, ratings, photos, videos and announcements from Cybertrend Media., Media/News Company, .

CyberTrend Media brings to you the Latest Technology, cybersecurity, Artificial intelligence, Machine learning, virtual reality, iot and blockchain ,threat intelligence and Tech Startup related event in the world.

Two alleged Chinese hackers have been accused of stealing data on the development of COVID-19 vaccines and breach the sy...
26/07/2020

Two alleged Chinese hackers have been accused of stealing data on the development of COVID-19 vaccines and breach the systems of hundreds of companies.

According to the US Department of Justice, two Chinese citizens — Li Xiaoyu, 34, and D**g Jiazhi, 33 — carried out cyberattacks against a number of US and global organizations.

Two alleged Chinese hackers have been accused of stealing data on the development of COVID-19 vaccines and breach the systems of hundreds of companies.

ThreatpostPrevious articleTwitter Confirms it was Hacked in an Unprecedented Cryptocurrency ScamAuthor:Tom SpringJuly 15...
16/07/2020

Threatpost
Previous article
Twitter Confirms it was Hacked in an Unprecedented Cryptocurrency Scam

Author:
Tom Spring
July 15, 2020 7:22 pm
Share this article:

The Twitter accounts of Bill Gates, Elon Musk, Joe Biden, Apple and Uber have each been hijacked at the same time to push a cryptocurrency scam in an unprecedented breach of Twitter accounts.

Twitter locked down thousands of verified accounts belonging to elite Twitter users and high-profile companies Wednesday afternoon in an effort to prevent hackers from perpetrating a massive cryptocurrency scam. The accounts fell victim to a compromise of the company’s internal systems by a group of unidentified hackers that managed to gain access to Twitter company tools and secured employee privileges.

The Twitter accounts of Gates, Musk, Biden, Apple and Uber have each been hijacked at the same time to push a cryptocurrency scam in an unprecedented breach of Twitter accounts.

The U.S. Federal Bureau of Investigation (FBI) issued warning to mobile banking app users that they will be increasingly...
12/06/2020

The U.S. Federal Bureau of Investigation (FBI) issued warning to mobile banking app users that they will be increasingly targeted by hackers trying to steal their credentials and take over their banking accounts. The alert was published on the agency's Internet Crime Complaint Center (IC3), which says that the increased usage of such apps during the pandemic could lead to more exploitation attempts targeting their users.

The U.S. Federal Bureau of Investigation (FBI) issued warning to mobile banking app users that they will be increasingly targeted by hackers trying to steal their credentials and take over their banking accounts.

Security researchers at WordFence, a company that’s focused on securing WordPress, have reported a burst of old-school a...
09/06/2020

Security researchers at WordFence, a company that’s focused on securing WordPress, have reported a burst of old-school attacks that are after your WordPress configuration data.

A million sites attacked by 20,000 different computers.

Microsoft Is Replacing Employees With AI…And Other Small Business Tech News.
09/06/2020

Microsoft Is Replacing Employees With AI…And Other Small Business Tech News.

Here are five things in technology that happened this past week and how they affect your business. Did you miss them?

The new Avaddon Ransomware has come into highlight which is targeting users worldwide through a massive spam campaign. A...
09/06/2020

The new Avaddon Ransomware has come into highlight which is targeting users worldwide through a massive spam campaign. Avaddon was launched on 04 June 2020 and is actively recruiting hackers and malware distributors to spread the ransomware by any means possible.

IBM will no longer offer general purpose facial recognition or analysis software, IBM CEO Arvind Krishna said in a lette...
09/06/2020

IBM will no longer offer general purpose facial recognition or analysis software, IBM CEO Arvind Krishna said in a letter to Congress today. The company will also no longer develop or research the technology, IBM tells The Verge. Krishna addressed the letter to Sens. Cory Booker (D-NJ) and Kamala Harris (D-CA) and Reps. Karen Bass (D-CA), Hakeem Jeffries (D-NY), and Jerrold Nadler (D-NY).

IBM is also advocating for police reform.

"Honda  confirm that a cyber-attack has taken place on the Honda network," the Japanese car-maker said in a statement.
09/06/2020

"Honda confirm that a cyber-attack has taken place on the Honda network," the Japanese car-maker said in a statement.

Car-maker says cyber-attack has affected production, sales and development worldwide.

Investigators earlier this year uncovered evidence of the hackers’ “longstanding compromises” at unnamed German companie...
27/05/2020

Investigators earlier this year uncovered evidence of the hackers’ “longstanding compromises” at unnamed German companies, according to the memo that German intelligence and security agencies sent last week to operators of critical infrastructure.

A Kremlin-linked hacking group has continued its long-running efforts to target German companies in the energy, water and power sectors, according to a confidential German government advisory obtained by CyberScoop. Investigators earlier this year uncovered evidence of the hackers’ “longstanding...

Tech giant Apple has largely relied on selling its hardware – iPhone, Mac laptops, and others. If you look at its contem...
25/05/2020

Tech giant Apple has largely relied on selling its hardware – iPhone, Mac laptops, and others. If you look at its contemporaries in the tech industry like Google and Microsoft, you will notice that these companies have taken a different approach. They have an alternate product strategy by building their own cloud platforms to scale their applications and drive innovation. This is in stark contrast to Apple, which has reportedly been using AWS for its infrastructure requirements.

It seems that Apple has expanded its focus on building a cloud platform for applications and services. Tech giant Apple has largely relied on selling its hardware – iPhone, Mac laptops, and others. If you look at its contemporaries in the tech industry like Google and Microsoft, you will notice th...

A new ransomware attack method takes defense evasion to a new level—deploying as a full virtual machine on each targeted...
24/05/2020

A new ransomware attack method takes defense evasion to a new level—deploying as a full virtual machine on each targeted device to hide the ransomware from view. In a recently detected attack, Ragnar Locker ransomware was deployed inside an Oracle VirtualBox Windows XP virtual machine. The attack payload was a 122 MB installer with a 282 MB virtual image inside—all to conceal a 49 kB ransomware executable.

A new ransomware attack method takes defense evasion to a new level—deploying as a full virtual machine on each targeted device to hide the ransomware from view. In a recently detected attack, Ragn…

GCHQ's National Cyber Security Centre (NCSC) told the BBC it was already aware of most of the issues raised and is in th...
19/05/2020

GCHQ's National Cyber Security Centre (NCSC) told the BBC it was already aware of most of the issues raised and is in the process of addressing them.

The UK's National Cyber Security Centre acknowledges problems identified by an independent report.

Human-operated ransomware' has been on a rise with the emergence of ProLock in the month of March, the new ransomware ca...
19/05/2020

Human-operated ransomware' has been on a rise with the emergence of ProLock in the month of March, the new ransomware came as a successor to 'PwndLocker', another variant of malware targeting all the major industries from finance, retail to healthcare and governmental organizations as well. Notably, in late April, the attack targeting the largest ATM provider in the United States, Diebold Nixdorf was the first major attack carried by ProLock where the attackers only compromised the company's corporate network while their ATMs and customer networks were left untouched, according to the media reports.
.

A new ransomware strain, ProLock acquiring access to victims' networks using QBot infections.

The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have releas...
18/05/2020

The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a list of top 10 vulnerabilities routinely exploited by hackers since 2016.

According to CISA, the primary purpose behind sharing the list is to advise security personnel to prioritise the work on patching critical vulnerabilities in their environments in efforts to spoil attacks from foreign cyber actors.

US cyber security agencies shares list of routinely exploited vulnerabilities since 2016The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI)

Accord to ESET researchers have discovered a previously unreported cyber-espionage framework that we named Ramsay and th...
17/05/2020

Accord to ESET researchers have discovered a previously unreported cyber-espionage framework that we named Ramsay and that is tailored for collection and exfiltration of sensitive documents and is capable of operating within air‑gapped networks..

ESET researchers have discovered Ramsay, a previously unreported cyber-espionage framework that is tailored for collection and exfiltration of sensitive documents and is capable of operating within air-gapped networks.

Microsoft has quietly added a built-in network packet sniffer to the Windows 10 October 2018 Update, and it has gone unn...
17/05/2020

Microsoft has quietly added a built-in network packet sniffer to the Windows 10 October 2018 Update, and it has gone unnoticed since its release.

A packet sniffer, or network sniffer, is a program that monitors the network activity flowing over a computer down to an individual packet level.

Microsoft has quietly added a built-in network packet sniffer to the Windows 10 October 2018 Update, and it has gone unnoticed since its release.

Nobody is talking about this today. Fighting hackers is the last thing on most folks’ minds. But coronavirus practically...
17/05/2020

Nobody is talking about this today. Fighting hackers is the last thing on most folks’ minds. But coronavirus practically guarantees “largest cyberattack ever” will soon be plastered all over the frontpages.

We’ll see the largest cyberattack in HISTORY within the next six months.

Attackers are trying to gain access to your system by exploiting vulnerabilities present inside your installed vulnerabl...
17/05/2020

Attackers are trying to gain access to your system by exploiting vulnerabilities present inside your installed vulnerable softwares. The main motive of the threat actors is to steal the data from the private sector as well as public sector organizations. So in the meanwhile Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) and the Federal Bureau of Investigation (FBI) shared a list of 10 most commonly exploited software vulnerabilities which can be helpful for attackers to gain access inside your system and from there they can steal data

Attackers are trying to gain access to your system by exploiting vulnerabilities present inside your installed vulnerable softw...

Address


Telephone

+2348034261841

Website

Alerts

Be the first to know and let us send you an email when Cybertrend Media. posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Cybertrend Media.:

Shortcuts

  • Address
  • Telephone
  • Alerts
  • Contact The Business
  • Claim ownership or report listing
  • Want your business to be the top-listed Media Company?

Share