25 C
Mumbai
Thursday, September 24, 2020
Tel: 8850717892
Home Security Awareness

Security Awareness

TrickBot Anchor Malware Now Targets Linux Systems

Backdoor implementation is enhancing in every aspect. Cyber groups are employing techniques to execute malicious activities in the host system along with establishing persistence....

Google Detected 11 Zero-Day Vulnerabilities in H1 2020

Recently, Google Project Zero released the list of vulnerabilities exploited in 2019. Along with the first “Year In Review” report, Google also mentioned the...

BootHole Bug Impacts Billions Of Devices

Cyber attacks are of two types: one in which crooks use advanced techniques to tamper with the systems and the other is when a...

GMERA Malware Targets Cryptocurrency Apps On MacOS

Cryptocurrency and blockchain technology are revolutionary advances. But with every transaction operated online through an application, it poses a serious threat from cyber crooks....

BlackRock Trojan Targets Android Apps To Steal Credentials

Android applications are seen to be most vulnerable to cyber-attacks. Moreover, the rise in operations of applications for the last three months has given...

Emotet Botnet Returns With Malicious Phishing Campaign

The botnet strategy of threat actors to infect systems in bulk is rampant. Moreover, the degree of severity is also soaring with every botnet...

“Blur” Photo Campaign Targets Android Users

Recently, Google Play Store was found with 29 malicious photo editing apps with a combined 3.5 million downloads running out-of-context ad campaigns. This is...

Phorpiex Botnet Uses Sextortion Emails To Generate Revenue

The experts and researchers in the domain of cybersecurity have seen an upsurge in ransomware attacks. And every time it’s more lethal than the...

Jackpotting Attack: Making ATM Machines Spit All Cash

ATM jackpotting, a technique to tamper with the machines to spit all cash inside, is becoming a vogue among criminals. ATM machines are enticing targets...

Mirai New Variant Targets IoT Devices For Botnet Strategy

IoT devices have made lives easier by providing a variety of services through a range of innovative devices. But being connected to a network,...

Endpoint Security: Defined, Explained and Explored

Cyber threats and security breaches are increasing rapidly with time. Information theft, brazen attacks and system compromise are familiar adversaries for organisations and companies...

Twitter Hacked: Biggest Attack In The History Of Social Media

On Wednesday, the tech giant Twitter witnessed the greatest cyber attack in the history of social media. To add to the extremity of the...

Most Read

Valentino Gareri’s New Model of Education

Valentino Gareri's new model of education combines all age groups into a close-knit campus while offering a spatial experience and a better study environment....

Sea of Thieves

INTRODUCTION:- SEA OF THIEVES is a 2018 Action-adventure online video game played in Multiplayer game mode in First Person and Third-person perspective view. This game...

Revisiting the Glorious Legacy of Ar. Kamu Iyer

Kamu Iyer; you might have heard this name in a lot of references related to the study of Architecture and heritage of Mumbai. The...

NBA 2K21

INTRODUCTION:- NBA 2K21 is a basketball simulation video game played in single-player and multiplayer game mode. This game is Developed by Usual Concerts and Published...