Yellow Camera: A Malicious Google Play Store App
Love editing your photos? More than two-dozen android photo-editing apps in the Google Play Store are found to contain malware- redirecting you to the...
INTRODUCTION
In a public statement, Avast has asserted that the attack on CCleaner was identified on the 23rd of September. The hackers had misused the...
4CAN V2 – DESIGNED TO FIND VULNERABILITIES IN MODERN CARS
In the 21st century, modern cars are utilizing a lot of innovation and technology to stay updated with the rising demands of customers. As...
Hack The Proxy – A Bug Bounty Program
Proxy Server:
A proxy server is a gateway between you and the Internet. An intermediary server separating end users from the websites they browse. Proxy...
Cutlet Maker: The ATM money blower malware !
The malware which has spread across the world infecting ATMs to blow out all the money is “Cutlet Maker Malware”. One such incident took...
LAZARUS GROUP ; A GATHERING OF CYBERCRIMINALS
WHO IS THE LAZARUS GROUP?
Lazarus Group also known as the Guardians of Peace is a gathering of cybercriminals consisting of an obscure number of...
Winnti’s: new Backdoor Dubbed Port Reuse !
The Winnti group of malware was first reported in 2013 by Kaspersky Lab. Since that year, threat actors leveraging Winnti malware have victimized a...
Am I Fully Secure Online with TOR Browser?
What is Tor?
Tor (The Online Router) is simply a network system that can be used to provide untraceable access to any internet services or...
FIN-7: The Cyber Terror Group!
On August 1, 2018, the US Department of Justice had arrested several individuals who were suspected to be the members of the FIN7 cybercrime...
- Advertisement -
Latest articles