32 C
Mumbai
Wednesday, October 21, 2020
Tel: 8850717892
Tags Hacker news

Tag: hacker news

Hackers After ‘Legacy Software’

First, we will see what is 'Legacy Software' Legacy Software is an old method, Technology, Computer System, or an application program of Relating to or...

Doki Malware Targeting Docker Services In The Cloud

Recently, new malware is traced by researchers targeting cloud services on Linux machines: Doki Malware. The malware is a previously undocumented technique infecting exposed...

100,000 BEC Attacks On 6,000+ Organisations

Recently, researchers at Barracuda security firm found thousands of organisations attacked with an influx of BEC attacks during the pandemic. With a huge hike in...

BlueRepli Bluetooth Attack Targets Android Devices

Recently, in the virtual meeting of Black Hat USA 2020, researchers have found a unique, queer yet effective way to hijack the android devices...

BadPower Attack: Your Smartphone May Explode While Charging

Recently, Chinese researchers have discovered rather a queer way to literally ‘destroy’ your smartphone through the mobile charger. This attack is known as the...

TrickBot Anchor Malware Now Targets Linux Systems

Backdoor implementation is enhancing in every aspect. Cyber groups are employing techniques to execute malicious activities in the host system along with establishing persistence....

BootHole Bug Impacts Billions Of Devices

Cyber attacks are of two types: one in which crooks use advanced techniques to tamper with the systems and the other is when a...

GMERA Malware Targets Cryptocurrency Apps On MacOS

Cryptocurrency and blockchain technology are revolutionary advances. But with every transaction operated online through an application, it poses a serious threat from cyber crooks....

BlackRock Trojan Targets Android Apps To Steal Credentials

Android applications are seen to be most vulnerable to cyber-attacks. Moreover, the rise in operations of applications for the last three months has given...

Emotet Botnet Returns With Malicious Phishing Campaign

The botnet strategy of threat actors to infect systems in bulk is rampant. Moreover, the degree of severity is also soaring with every botnet...

“Blur” Photo Campaign Targets Android Users

Recently, Google Play Store was found with 29 malicious photo editing apps with a combined 3.5 million downloads running out-of-context ad campaigns. This is...

Phorpiex Botnet Uses Sextortion Emails To Generate Revenue

The experts and researchers in the domain of cybersecurity have seen an upsurge in ransomware attacks. And every time it’s more lethal than the...

Jackpotting Attack: Making ATM Machines Spit All Cash

ATM jackpotting, a technique to tamper with the machines to spit all cash inside, is becoming a vogue among criminals. ATM machines are enticing targets...

Mirai New Variant Targets IoT Devices For Botnet Strategy

IoT devices have made lives easier by providing a variety of services through a range of innovative devices. But being connected to a network,...

Endpoint Security: Defined, Explained and Explored

Cyber threats and security breaches are increasing rapidly with time. Information theft, brazen attacks and system compromise are familiar adversaries for organisations and companies...

Twitter Hacked: Biggest Attack In The History Of Social Media

On Wednesday, the tech giant Twitter witnessed the greatest cyber attack in the history of social media. To add to the extremity of the...

“Undeletable” Adware Hits Android Users

Adware or advertising-supported software is used by developers to generate revenue by launching on-screen ads. Adware is usually accompanied by other malware scripts to...

Try2Cry “Stupid” Ransomware

Ransomware attacks are unprecedentedly rising during COVID times. The increase in such attacks is rampant and involves advanced and highly notorious techniques. But all...

EvilQuest macOS Ransomware: A Smokescreen for Other Threats

The COVID-19 crisis has witnessed ample of cyberattacks. Ransomware is the most rampant threat organisations, and individuals are facing worldwide. This time threat actors...

Promethium: A “state-backed” APT Targets India

India is among the top five countries being targeted online. Most of the attacks stem from China, Russia, Pakistan, Ukraine, Vietnam and North Korea....
- Advertisment -

Most Read

Equinix Ransomware

RANSOMWARE attack hits Equinix companies internal system. Before going forward we will first see, What is Equinix? Equinix is a leading global interconnection platform, it is...

A brief to Architecture Journalism as a Career Path

Not all students prefer jumping into the career path of practising architecture. It is great when you design, but it could be dreading when...

Social Housing, Home for All

The term ‘social housing’ is given to accommodation which is affordable to low-income people or with particular needs on a secure basis. The state,...

Shopify International Data Breach

First, we will see, What is SHOPIFY ? and how does it work? 1) What is Shopify? Shopify is the best E-Commerce platform that allows anyone to...