Atul Narula (Page 18)

He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.

The European Union Aviation Safety Agency (EASA) issued an emergency alert after some flights in the region had to be diverted or changed destinations following continued interference detected on navigationRead More →

This week, Wordfence research teams detected an increase in infected websites hosted on the WordPress service managed by web hosting firm GoDaddy, which includes MediaTemple, tsoHost, 123Reg, Domain Factory, HeartRead More →

Cybersecurity specialists recommend users of Parse Server, a popular API server module for Node/Express, immediately apply a fix for a newly detected remote code execution (RCE) vulnerability. Identified by securityRead More →

Cybersecurity specialists report the detection of a severe vulnerabilities in cURL, a software project consisting of a library and a command interpreter oriented to file transfer. According to the report,Read More →

In an unexpected decision, the UK’s Financial Conduct Authority (FCA) has determined that all active cryptocurrency ATMs in its territory are operating illegally and will need to close in theRead More →

This weekend, technology firm Veeam announced the release of some security patches to address two critical vulnerabilities in Backup & Replication, a backup solution for virtual environments. This application providesRead More →

Through a security report, representatives of Denso Corporation confirmed a massive cyberattack that impacted the firm’s German headquarters. Denso is a global supplier of automotive components, including those developed forRead More →

Mobile hacking is one of the most dangerous cybercriminal trends, as it allows threat actors to conduct detailed surveillance of people of interest, steal personal information, and even empty bank accountsRead More →