32 C
Mumbai
Wednesday, October 21, 2020
Tel: 8850717892

Ayush Dubey

Ayush Dubey is an engineering student from IIIT Jabalpur. He has a comprehensive background in technology. Cybersecurity being his primary field of interest. He loves to meet people who are always in a hustle to learn new things.

More Articles

Doki Malware Targeting Docker Services In The Cloud

Recently, new malware is traced by researchers targeting cloud services on Linux machines: Doki Malware. The malware is a previously undocumented technique infecting exposed Docker servers in AWS, Azure, and other cloud platforms. The threat landscape...

100,000 BEC Attacks On 6,000+ Organisations

Recently, researchers at Barracuda security firm found thousands of organisations attacked with an influx of BEC attacks during the pandemic. With a huge hike in organisations operating online during the COVID times, a plethora of malicious...

BlueRepli Bluetooth Attack Targets Android Devices

Recently, in the virtual meeting of Black Hat USA 2020, researchers have found a unique, queer yet effective way to hijack the android devices through a new Bluetooth vulnerability called BlueRepli. This enables attackers to...

BadPower Attack: Your Smartphone May Explode While Charging

Recently, Chinese researchers have discovered rather a queer way to literally ‘destroy’ your smartphone through the mobile charger. This attack is known as the BadPower Attack can meltdown your smartphone through malicious codes tampering with...

TrickBot Anchor Malware Now Targets Linux Systems

Backdoor implementation is enhancing in every aspect. Cyber groups are employing techniques to execute malicious activities in the host system along with establishing persistence. Recently, a researcher traced a high-profile malware expanding its attack landscape...

Google Detected 11 Zero-Day Vulnerabilities in H1 2020

Recently, Google Project Zero released the list of vulnerabilities exploited in 2019. Along with the first “Year In Review” report, Google also mentioned the zero-day vulnerabilities they’ve come along in the first half of 2020. According...

BootHole Bug Impacts Billions Of Devices

Cyber attacks are of two types: one in which crooks use advanced techniques to tamper with the systems and the other is when a service reaches the consumers with an innate vulnerability and attackers leverages...

GMERA Malware Targets Cryptocurrency Apps On MacOS

Cryptocurrency and blockchain technology are revolutionary advances. But with every transaction operated online through an application, it poses a serious threat from cyber crooks. Recently, macOS users were victimised as threat actors spoofed legitimate trading...

BlackRock Trojan Targets Android Apps To Steal Credentials

Android applications are seen to be most vulnerable to cyber-attacks. Moreover, the rise in operations of applications for the last three months has given cyber crooks a large number of potential targets. Recently, ThreatFabric security...

- Advertisement -

Discover

Trending

Equinix Ransomware

RANSOMWARE attack hits Equinix companies internal system. Before going forward we will first see, What is Equinix? Equinix is a leading global interconnection platform, it is...

A brief to Architecture Journalism as a Career Path

Not all students prefer jumping into the career path of practising architecture. It is great when you design, but it could be dreading when...

Social Housing, Home for All

The term ‘social housing’ is given to accommodation which is affordable to low-income people or with particular needs on a secure basis. The state,...

Shopify International Data Breach

First, we will see, What is SHOPIFY ? and how does it work? 1) What is Shopify? Shopify is the best E-Commerce platform that allows anyone to...

Cheap Flooring Ideas

When you are choosing a new floor tile for your house, kitchen or bath, you shall always do a beforehand homework. Spend some time...