fbpx
MTA-STS Improve Your Email Security

MTA-STS Improve Your Email Security

Simple Mail Transfer Protocol or SMTP has easily exploitable security loopholes. Email routing protocols were designed in a time when cryptographic technology was at a nascent stage (e.g., the defacto protocol for email transfer, SMTP, is nearly 40 years old now), and...
Cybercrime Asking Insiders to Plant Malware

Cybercrime Asking Insiders to Plant Malware

A Nigerian cybercrime threat actor has been observed attempting to recruit employees by offering them to pay $1 million in bitcoins to deploy Black Kingdom ransomware on companies’ networks as part of an insider threat scheme. At the beginning of October, a...
IoT Devices Spied on Through SDK Bug

IoT Devices Spied on Through SDK Bug

A security vulnerability has been found affecting several versions of ThroughTek Kalay P2P Software Development Kit (SDK), which could be abused by a remote attacker to take control of an affected IoT device and potentially lead to remote code executions. The issue...
Touchless Security – New Security Buzzword

Touchless Security – New Security Buzzword

Much of what people do on daily basis involves touching hundreds of items without thought – we turn to a doorknob to open a door, touch a keypad to type on a computer and push elevator buttons to close the door and select a floor. Until recently, people...