Security Awareness

Sudo Bug Let’s Non Privileged User Run Commands As Root

A vulnerability in the Linux sudo command has been discovered which allows unprivileged users to execute commands as root. Only good thing is that this vulnerability...

Emocheck tool

We have heard a lot about various distributed malware. Emotet Trojan is also one of those. The Emotet Trojan is currently one of the...

Google Map Hacks

Google Maps has been around a decade old now, and it has undergone a significant number of changes since then. Today, it is packed...

NSA Release Guidelines To Improve Cloud Security

National Security Agency (NSA) regulates new information sheets with guidelines for 2020 which other than the identification of cloud security components, threat actors, include...

H&M Probed Over Alleged Snooping on Their Own Employees

Today, Hennes & Mauritz Retail Private Limited, (collectively referred to as “H&M” or “We”) doesn't need any introduction. It was found in 1947 and has grown into one...

Anubis Android banking Trojan

Anubis is back. Yes, you heard absolutely correct. Anubis is back on track. Let's understand what it is, it's functioning, working and consequences in...

FortiSIEM

Today, Security is no longer just about keeping data and information confidential, it's turning out to be much more than that. It is crucial...

Ako Ransomware

Ako ransomware is a ransomware-type infection. Ako majorly encrypts all file types. As soon as encryption is done, ako places a special text file...

Juice Jacking

A new way to steal your data is Juice Jacking. Even costly mobiles, cannot prevent your data from being stolen with so much ease....

- Advertisement -

Latest articles

- Advertisement -