Atul Narula (Page 7)

He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.

After a researcher detected a specially crafted Word file to run arbitrary PowerShell on Windows systems, Microsoft confirmed that its operating system is affected by a zero-day vulnerability tracked asRead More →

Cybersecurity specialists published a report detailing the finding of what they describe as a “design flaw” in the Fast Identity Online (FIDO) passwordless authentication system. The report, titled “Provable SecurityRead More →

During the last couple of weeks, dozens of notes and reports have been published about the cybercriminal group Killnet, described as a pro-Russia hacking operation and which has become relevantRead More →

Information security specialists report the detection of a severe vulnerability in the TP-Link TL-WR840N EU routers. According to the report, successful exploitation of this flaw would allow threat actors toRead More →

The U.S. Federal Trade Commission (FTC) announced a $150 million fine against Twitter after discovering that the company used the phone numbers and email addresses used for multi-factor authentication ofRead More →

Researchers from Google Threat Analysis Group (TAG) report that in 2021, software development firm Cytrox sold Predator spyware to various hacking groups backed by state actors. These attacks are basedRead More →

A couple of months ago, CloudSEK researchers identified a new and unusual strain of ransomware. Dubbed GoodWill, this new variant of encryption malware appears to pursue very different targets thanRead More →

Microsoft published a report detailing its researchers’ findings on payment card stealing malware, mentioning that threat actors increasingly use malicious PHP scripts to manipulate payment systems and bypass online securityRead More →