19.2 C
Jaipur
Monday, November 29, 2021

AUTHOR NAME

Chetan

36996 POSTS
0 COMMENTS

Hackers Abusing Docker Hub Account to Mine Monero Cryptocurrency

Researchers observed a malicious Docker Hub account, “azurenql” that was active since October 2019 hosting malicious images to mine cryptocurrency, Monero. According to wallet IDs,...

Most Important Consideration For Credit Card Fraud You Need to Know

Not even a pandemic can slow down, let alone stop, credit card fraud. A Wall Street Journal report reveals that the amount of fraudulent...

A complete Active Directory Penetration Testing Checklist

This article covers Active directory penetration testing that can help for penetration testers and security experts who want to secure their network. “Active Directory”...

New Ransomware Strain Attacks Android Devices Encrypts Photos

A new ransomware strain dubbed CryCryptor targeting Android users, particularly users in Canada posing as an official COVID-19 tracing app from Health Canada. The CryCryptor...

Tens of Thousands of Printers Exposed Online Leaking WiFi SSIDs

Tens of Thousands of Printers Exposed Online opens the door for hackers to steal sensitive information, service disruption, and in some cases remote command...

How to Detect Obfuscated Malware on Your Server

Traditional malware detecting methods are ineffective against the hackers’ new techniques – deploying malware which is obfuscated. That’s why an innovative new approach is required...

Beware of New Mac Malware Spreading via Poisoned Search Results

Security researchers discovered a new Mac malware Shlayer spreading through Google poisoned search results. The malware distributed masqueraded as a fake Adobe Flash Player...

Massive Spying Campaign Targets Chrome Browser Extensions

A newly discovered massive spyware campaign uses Chrome browser extensions aimed to steal sensitive data from users across multiple geographies and industry segments. Researchers from...

OWASP Top 10 Proactive Controls for Software Developers

Proactive Controls for Software developers describing the more critical areas that software developers must focus to develop a secure application. The OWASP Top 10 Proactive...

Cognizant Confirms Data Breach following Ransomware Attack

IT services giant cognizant suffered a ransomware attack last April which cause service disruptions to its clients. Cognizant is one of the IT giants that...

Latest news

- Advertisement -