Thunderbolt Devices Exposed to ‘ThunderSpy’ Attack
A very new vulnerability has been discovered in Thunderbolt-equipped devices. It just takes 5 minutes for an attacker to launch a new data-stealing attack...
RATicate Group Hits Enterprises With Revolving Payloads
Hackers are using the global COVID-19 pandemic to propagate the payload around several enterprises. Hackers are using NSIS as an installer to target industrial...
A Surprising Google Tool used to Carryout Cyber-attacks
Google developed Captcha to stop bots from accessing websites and they used it extensively. They promoted it so much so that mere listening to...
Blue Mockingbird Monero-Mining Campaign Exploits Web Apps
Over the years, cryptocurrency has evolved as a perpetual form. The exponential rise in its market value lures many technocrats. But with such growing...
WordPress Plugins Make Websites Vulnerable
We all have heard about WordPress. It is a CMS tool which allows user to create their websites in quick and easy steps. Even...
“ILOVEYOU” Virus that Infected 50 Million Windows Computers In 10 Days
The very first computer virus was discovered in 1986, it was named as “brain”. Sounds weird right!. Since then many refined computer viruses...
COVID-19 Used as Bait for DocuSign Phishing Campaign
A famous electronic document signing platform, DocuSign, fall prey to phishing attacks recently. Attackers used fake emails with COVID-19 related news to lure victims...
Shade Threat Actors Releases 750K Encryption Keys
CONTEXT:
Over the years, ransomware has caused huge damage to the business firm as well as the common user. One of its type “shade-ransomware” has...
More Than a Million PCs Exposed to Hackers
All the PCs with a thunderbolt port are exposed to hacking by a new technique called thunderspy. Using this new technique the attacker can...
- Advertisement -
Latest articles