Skip to content
Hello Please engage with us
Register Lost Password Log In
Nasni Consultants

Information and Communications Technology Solutions and Engineering Consultancy

  • Home
  • Portfolio
  • Trending Technology News
  • Contact Us
  • Your Feedback
Menu Close
  • Home
  • Portfolio
  • Trending Technology News
  • Contact Us
  • Your Feedback

Breadcrumbs

  1. Home>
  2. Breadcrumbs>
  3. Page 6
Read more about the article Meet the Administrators of the RSOCKS Proxy Botnet

Meet the Administrators of the RSOCKS Proxy Botnet

  • Post author:Diran Taofeek Folami
  • Post published:June 22, 2022
  • Post category:Cybersecurity
  • Post last modified:June 22, 2022

Authorities in the United States, Germany, the Netherlands and the U.K. last week said they dismantled the “RSOCKS” botnet, a collection of millions of hacked devices that were sold as…

Continue ReadingMeet the Administrators of the RSOCKS Proxy Botnet
Read more about the article Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

  • Post author:Diran Taofeek Folami
  • Post published:April 22, 2022
  • Post category:Cybersecurity
  • Post last modified:April 22, 2022

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members…

Continue ReadingLeaked Chats Show LAPSUS$ Stole T-Mobile Source Code
Read more about the article Who Wrote the ALPHV/BlackCat Ransomware Strain?

Who Wrote the ALPHV/BlackCat Ransomware Strain?

  • Post author:Diran Taofeek Folami
  • Post published:January 28, 2022
  • Post category:Cybersecurity
  • Post last modified:January 28, 2022

In December 2021, researchers discovered a new ransomware-as-a-service named ALPHV (a.k.a. “BlackCat“), considered to be the first professional cybercrime group to create and use a ransomware strain written in the…

Continue ReadingWho Wrote the ALPHV/BlackCat Ransomware Strain?
Read more about the article Who is the Network Access Broker ‘Wazawaka?’

Who is the Network Access Broker ‘Wazawaka?’

  • Post author:Diran Taofeek Folami
  • Post published:January 12, 2022
  • Post category:Cybersecurity
  • Post last modified:January 12, 2022

In a great many ransomware attacks, the criminals who pillage the victim’s network are not the same crooks who gained the initial access to the victim organization. More commonly, the…

Continue ReadingWho is the Network Access Broker ‘Wazawaka?’
Read more about the article Who Is the Network Access Broker ‘Babam’?

Who Is the Network Access Broker ‘Babam’?

  • Post author:Diran Taofeek Folami
  • Post published:December 3, 2021
  • Post category:Cybersecurity
  • Post last modified:December 3, 2021

Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in acquiring remote…

Continue ReadingWho Is the Network Access Broker ‘Babam’?
Read more about the article REvil Ransom Arrest, $6M Seizure, and $10M Reward

REvil Ransom Arrest, $6M Seizure, and $10M Reward

  • Post author:Diran Taofeek Folami
  • Post published:November 9, 2021
  • Post category:Cybersecurity
  • Post last modified:November 9, 2021

The U.S. Department of Justice today announced the arrest of Ukrainian man accused of deploying ransomware on behalf of the REvil ransomware gang, a Russian-speaking cybercriminal collective that has extorted…

Continue ReadingREvil Ransom Arrest, $6M Seizure, and $10M Reward
Read more about the article How Does One Get Hired by a Top Cybercrime Gang?

How Does One Get Hired by a Top Cybercrime Gang?

  • Post author:Diran Taofeek Folami
  • Post published:June 15, 2021
  • Post category:Cybersecurity
  • Post last modified:June 15, 2021

The U.S. Department of Justice (DOJ) last week announced the arrest of a 55-year-old Latvian woman who’s alleged to have worked as a programmer for Trickbot, a malware-as-a-service platform responsible…

Continue ReadingHow Does One Get Hired by a Top Cybercrime Gang?
Read more about the article Using Fake Reviews to Find Dangerous Extensions

Using Fake Reviews to Find Dangerous Extensions

  • Post author:Diran Taofeek Folami
  • Post published:May 29, 2021
  • Post category:Cybersecurity
  • Post last modified:May 29, 2021

Fake, positive reviews have infiltrated nearly every corner of life online these days, confusing consumers while offering an unwelcome advantage to fraudsters and sub-par products everywhere. Happily, identifying and tracking…

Continue ReadingUsing Fake Reviews to Find Dangerous Extensions
Read more about the article WeLeakInfo Leaked Customer Payment Info

WeLeakInfo Leaked Customer Payment Info

  • Post author:Diran Taofeek Folami
  • Post published:March 15, 2021
  • Post category:Cybersecurity
  • Post last modified:March 15, 2021

A little over a year ago, the FBI and law enforcement partners overseas seized WeLeakInfo[.]com, a wildly popular service that sold access to more than 12 billion usernames and passwords…

Continue ReadingWeLeakInfo Leaked Customer Payment Info
Read more about the article Who’s Behind the “Reopen” Domain Surge?

Who’s Behind the “Reopen” Domain Surge?

  • Post author:Diran Taofeek Folami
  • Post published:April 20, 2020
  • Post category:Cybersecurity
  • Post last modified:April 20, 2020

The past few weeks have seen a large number of new domain registrations beginning with the word “reopen” and ending with U.S. city or state names. The largest number of…

Continue ReadingWho’s Behind the “Reopen” Domain Surge?

  • Go to the previous page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6

Categories

  • 5G (1,068)
  • Big Data (215)
  • Broadband/ Network (11)
  • Chemical Engineering (11)
  • Cloud Computing (20)
  • Computer Aided Process Equipment Design (1)
  • Contracts Management (1)
  • Cybersecurity (2,353)
  • Emerging Technologies (23)
  • Engineering (2)
  • Environment (184)
  • Fluid Handling and Processing (1,860)
  • GDPR (25)
  • Hospital Management (1)
  • Hotel Management (2)
  • Information Technology (2,981)
  • Innovation (222)
  • Internet of Things (34)
  • IT/Technology General (147)
  • Lifestyle (1,363)
  • Multimedia, Content & Apps (5)
  • Network Management (6)
  • Office Management (2)
  • Online Learning (292)
  • Open Source (1,160)
  • Payroll Management (1)
  • Personnel Management (1)
  • Policy/ Regulatory Reform (1)
  • Process Control (1)
  • Quality Assurance (1)
  • Research & Development (21)
  • Sales Information Management (1)
  • School Records Management (1)
  • Science and Technology (6,497)
  • Smart Cities (10)
  • SMEs/Entrepreneurship (4)
  • Software Development (39)
  • Sustainable Development Goals (1)
  • Technology (2,115)
  • Travel (1)
  • Web Apps Development (110)
  • Website Design and Development (110)

Tags

%G (1037) 5G (1069) AI (78) AI & ML (136) Aircraft (189) A Little Sunshine (306) Apple (158) Architecture (335) Around The Home (63) artificial intelligence (380) Automotive (597) Beverage Industry (130) Bicycles (275) Big Data (223) Big Story (75) Biology (181) Blog (237) Body&Mind (153) Case Studies (431) Cloud (230) cloud security (84) Commentary (76) Company News (180) Consumer Tech (149) CXO (269) Cybersecurity (145) Data Breaches (79) Developer (388) Drones (85) Emerging Trends (71) Energy (162) Environment (168) Ericsson (94) Español (225) Flow Control and Measurement (395) Gas Processing (82) generative ai (76) Good Thinking (84) Google (165) Hardware (106) Health&Wellbeing (304) Home Banner (147) Home Entertainment (137) Huawei (65) Innovation (177) Innovations (611) International (183) Latest Warnings (115) Level Control and Measurement (128) Lifestyle (1306) Linux (90) Marine (117) Market Updates (106) Materials (143) Medical (590) microsoft (313) Military (117) Mobile Technology (95) Mobility (117) Motorcycles (154) Music (82) Ne'er-Do-Well News (204) networking (121) News (448) Oil Processing (67) Open Source (438) Outdoors (313) payroll (125) payroll software (67) Photography (111) Pressure Control and Measurement (79) Process and Control Valves (293) Project Management (134) Pumps and Pumping Systems (386) Radar Trends (64) Ransomware (1665) robotics (155) Science (1990) security (408) Signals (94) Software (826) Space (316) Syndicated (17078) Tech & Work (201) Tech News (320) Technology (1228) The Coming Storm (141) Thought Leaders (78) Time to Patch (78) Tiny Houses (145) Top News (308) Top Products (83) TR Academy (71) Transport (1451) Urban Transport (99) Wastewater Process (120) Water Processing (101) Wearables (124) Web Design (92) Web Fraud 2.0 (128)

Archives

Copyright - WordPress Theme by OceanWP

Copyright © 2025 Nasni Consultants Ltd. All Rights Reserved


This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settings AcceptRead MoreReject
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT