Atul Narula (Page 26)

He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.

A new bill introduced in Florida’s Senate seeks to ban what lawmakers define as unauthorized digital trafficking of counterfeit lewd content, establishing tough measures against the practice known as revengeRead More →

The government of France announced the arrest of thirteen people accused of having hacked the account of a nurse to create more than 60,000 COVID-19 passes. Although their names areRead More →

The U.S. Department of Justice (DOJ) reports that Israeli citizen Tal Prihar has been sentenced to eight years in prison for his participation in the administration of DeepDotWeb (DDW), aRead More →

Specialists report that the Internet infrastructure in North Korea is experiencing severe disruptions during the last weeks, possibly caused by a denial of service (DoS) attack. The latest incident tookRead More →

Although law enforcement in Russia, the United States and other countries believed that the recent arrest of some members of the cybercriminal group REvil would represent a severe blow toRead More →

Cybersecurity specialists mention that the developers of the Trickbot Trojan have added a new set of advanced features to prevent researchers from reverse-engineering this malware, protection based on the blockingRead More →

Cybersecurity specialists reported the detection of three vulnerabilities in PrinterLogic whose exploitation would allow threat actors to trace a remote code execution path on any connected endpoint. As you mayRead More →

In a security alert, Microsoft warned Office 365 customers about a phishing campaign in which threat actors seek to get affected users to grant OAuth permissions and eventually access theirRead More →