Sudo Bug Let’s Non Privileged User Run Commands As Root
A vulnerability in the Linux sudo command has been discovered which allows unprivileged users to execute commands as root. Only good thing is that this vulnerability...
We have heard a lot about various distributed malware. Emotet Trojan is also one of those. The Emotet Trojan is currently one of the...
Google Maps has been around a decade old now, and it has undergone a significant number of changes since then. Today, it is packed...
NSA Release Guidelines To Improve Cloud Security
National Security Agency (NSA) regulates new information sheets with guidelines for 2020 which other than the identification of cloud security components, threat actors, include...
H&M Probed Over Alleged Snooping on Their Own Employees
Today, Hennes & Mauritz Retail Private Limited, (collectively referred to as “H&M” or “We”) doesn't need any introduction. It was found in 1947 and has grown into one...
Anubis is back. Yes, you heard absolutely correct. Anubis is back on track. Let's understand what it is, it's functioning, working and consequences in...
Today, Security is no longer just about keeping data and information confidential, it's turning out to be much more than that. It is crucial...
Ako ransomware is a ransomware-type infection. Ako majorly encrypts all file types. As soon as encryption is done, ako places a special text file...
A new way to steal your data is Juice Jacking. Even costly mobiles, cannot prevent your data from being stolen with so much ease....
- Advertisement -
Latest articles