Security Awareness

Metaspoilt Framework, A popular Tool among Cyber Criminals

First, in this topic, we will see, What is the Metasploit Framework? 1) What is the Metasploit Framework? Metasploit Framework is a widely used penetration testing...

Equinix Ransomware

RANSOMWARE attack hits Equinix companies internal system. Before going forward we will first see, What is Equinix? Equinix is a leading global interconnection platform, it is...

Shopify International Data Breach

First, we will see, What is SHOPIFY ? and how does it work? 1) What is Shopify? Shopify is the best E-Commerce platform that allows anyone to...

Hackers After ‘Legacy Software’

First, we will see what is 'Legacy Software' Legacy Software is an old method, Technology, Computer System, or an application program of Relating to or...

100,000 BEC Attacks On 6,000+ Organisations

Recently, researchers at Barracuda security firm found thousands of organisations attacked with an influx of BEC attacks during the pandemic.With a huge hike in...

BlueRepli Bluetooth Attack Targets Android Devices

Recently, in the virtual meeting of Black Hat USA 2020, researchers have found a unique, queer yet effective way to hijack the android devices...

BadPower Attack: Your Smartphone May Explode While Charging

Recently, Chinese researchers have discovered rather a queer way to literally ‘destroy’ your smartphone through the mobile charger. This attack is known as the...

TrickBot Anchor Malware Now Targets Linux Systems

Backdoor implementation is enhancing in every aspect. Cyber groups are employing techniques to execute malicious activities in the host system along with establishing persistence....

Google Detected 11 Zero-Day Vulnerabilities in H1 2020

Recently, Google Project Zero released the list of vulnerabilities exploited in 2019. Along with the first “Year In Review” report, Google also mentioned the...

- Advertisement -

Latest articles

- Advertisement -