39 C
Jaipur
Sunday, April 11, 2021

CATEGORY

Hacking

New Wormable Android Malware Spreads Through WhatsApp Messages

Check Point Research (CPR) team has recently discovered a new Android malware that tricks the users into promising to provide them Netflix premium subscription...

Malicious Document Builder “EtterSilent” Used by Top Hackers Group

A new hacking tool for carrying out email attacks has been promoted by the threat actors on hacker forums since at least the middle...

Ransomware Gangs Using a new Method to Collect Ransom Payments from Victims

There are many ransomware gangs in the wild, and among them, the top ones are implementing new methods to pressure more victim organizations to...

Hackers Abusing GitHub Infrastructure To Mine Cryptocurrency

The IT service management portal, GitHub, is actively reviewing a series of attacks, as the threat actors are rigorously abusing the infrastructure and the...

7 Reasons Active Threat Monitoring is the New Business Norm

Active threat monitoring can be what stands between your business and certain disaster at the hands of an attacker. As technology advances, so too...

Hackers Exploit FortiOS Vulnerabilities to Access Government and Technology Services Networks

Recently, in March, the news got spread all over the internet that hackers are currently exploiting three known Fortinet FortiOS vulnerabilities. The case was initially...

“System Update” Android Malware Steals Photos, Videos & GPS Location

We should always stay alert and cautious with the applications that we download and install from outside the Play Store since we can download...

533 MILLION Facebook Users Personal Data Leaked

Recently, on a hacker forum, more than 533 million users’ personal data of the social network giant Facebook were leaked and published.  The personal data...

Choosing The Best Option for You

What is Security Software? Security software are solutions designed to protect your systems and devices from malicious applications or code. These solutions typically include features...

North Korean Hackers Use Exploits to Plant Malware on Researcher’s Computers

The North Korean hackers have once again used fake Twitter and LinkedIn accounts to target users from the cybersecurity field. Recently, cybersecurity researchers have...

Latest news