Video Sharing Platform DailyMotion Falls Victim To Credential Stuffing Attack

After meddling with a number of social networks, it seems the hackers have moved their focus to video-sharing platforms as well. Reportedly, DailyMotion – a popular platform for videos – has become the recent victim of cyber attack. The firm confirmed that it endured credential stuffing attack that affected some accounts.

Source: latesthackingnews

Continue reading “Video Sharing Platform DailyMotion Falls Victim To Credential Stuffing Attack”

Advertisements

Hackers Using Google Cloud Computing Platform To Deliver Targeted Malware Attacks via Weaponized PDF

Threat actors using Google computing platform (GCP) to deliver the malware through malicious PDF files. The attack targeting governments and financial firms worldwide.

According to Netskope Threat Research Labs detected the targeted based on its 42 customers instances and likely the attacks to be launched by the infamous hacking group Cobalt Strike.

Source: gbhackers

Continue reading “Hackers Using Google Cloud Computing Platform To Deliver Targeted Malware Attacks via Weaponized PDF”

Mbahet gara për siguri kibernetike “Cyber Security Hackathon” edicioni i parë

Për herë të parë në qytetin e Mitrovicës gjigantin industrial është mbajtur gara kibernetike “Cyber Security Hackathon #1”, e organizuar nga ICT Academy në partneritet me Education Innovators Kosovo – EIK dhe mbështetës Komuna e Mitrovicës, Kolegji Universum, VIPA chips, Ujë Rugove, Redbull, Pizeria Dielli. Continue reading “Mbahet gara për siguri kibernetike “Cyber Security Hackathon” edicioni i parë”

Krimet kompjuterike principet & diferencat

Atdhe Buja ekspert i sigurisë kibernetike

Krimi është krim dhe kompjuteri është vetëm një vegël për të realizuar aktivitete kriminale. Arsyeja pse kemi diferenca, kategorizime të krimeve kompjuterike është që ligji të ketë mundësi për tu aplikuar për këto lloje të krimeve, por edhe më shumë që janë në botën digjitale. P.sh. dikush hyn në kompjuterin tënd dhe nuk shkakton dëme por ai ose ajo nuk duhet të jetë aty fare. Çka nëse një haker ka marr qasjen në sistem pret dhe ruan momentin e realizimit të sulmit tjetër dëmtimin apo rrjedhjen e informacioneve. Continue reading “Krimet kompjuterike principet & diferencat”

Planning & managing projects

Article by Atdhe Buja
Published on PCWorld.al
working groups during study in Japan for PMP

The purpose of this article is to provide a clear overview of the project planning and management processes and to see enough the importance of applying guidelines and standards for successful project management. Here is also used some of the experience in project management in our Kosovo country to express a realistic situation of project failures cases and the organization’s impact on the project.

Continue reading “Planning & managing projects”

Is there a real need for e-services or EAs?

Article by Atdhe Buja
Published on PCWorld.al

In this analysis and special study for PCWorld and CiO Albanian are presented the solutions in providing the appropriate and efficient services at the right time for the citizens / businesses that need it, at the same time will share with you a part of my experience in residence in Tokyo Japan and visits and meetings I had about the topic of this article.  Continue reading “Is there a real need for e-services or EAs?”

Blog at WordPress.com.

Up ↑