AcidBox Malware Leverages Turla’s Exploit To Target Russian Firms
Attackers have found a new way to exploit and compromise organisations by targeting virtualization software. In 2008, a highly notorious pro-Russian Advanced Persistent Threat...
Google Removed 106 Malicious Chrome Extensions
Google developed Chrome-a cross-platform web browser- in 2008. Google Chrome is the most used web browser. With the highest usage share on desktops, mobiles...
Lamphone Attack: Spying Using Light Bulbs
We have the perception of “hacking” as a practice of compromising “smart” devices. What else hackers could use to breach your privacy and spy...
29 Million Indian Jobseekers Details Leaked on DarkWeb For Free
About:
Amidst the COVID-19 break, India has encountered significant data breaches reported on the 24th of May. The cybersecurity firm Cyble said 29 million user...
Data of 3.5 Million Zoomcar Customers Data up For Sale
The vogue of data leaks continues as India's major startup company Zoomcar has received a significant data breach on its server. According to a...
New Jailbreak Tool to Unlock iPhone Released by Hackers
Apple is considered as the most secure and reliable support system. Although, from the last few years, it has been a potential target for...
VPN Concerns With Work from Home Employees
CONTEXT:
The amidst breakout of COVID-19 has harmed commercial enterprises. Employees are compelled to work from home. It was challenging for the companies to put...
The Dark Secrets of a Hacking Hero
In the year 2017, a 23 years old hacker, "Marcus Hutchins" saved the digital world "Internet." A wicked ransomware attack known as WannaCry had...
CursedChrome Extensions turns Chrome into a Hacker’s Proxy
Third-party extensions have always been a threat to google chrome users. Recently, security personnel proclaimed a proof-of-concept on dangerous Chrome extensions that transforms Chrome...
- Advertisement -
Latest articles