Posts

Showing posts from February, 2021

Tibetan Organizations Targeted in a Chinese Sponsored Phishing Campaign

American Telecommunications Firm, T-Mobile Confirmed Data Breach and Sim Swapping Attacks

IBM: Cyber attacks on Linux systems of Russian government agencies will increase

Alexa Skills can Easily Bypass Vetting Process

Steris Corporation, The Latest Victim of Ransomware Gang Called ‘Clop’.

SQL Triggers Used by Hackers to Compromise User Database

Sequoia Capital Discloses Data Breach Following Failed BEC Attack

Unprotected Private Key Allows Remote Hacking of PLCs

AIVD says they face cyber attacks from Russia and China every day

Critical Vulnerability In VMware Servers Being Scanned After PoC Exploit Release – Patch Now!

Educational Institutions Websites Found Vulnerable to Multiple Threats

Misconfigured Baby Monitors Can Allow Intruders To Spy On Your Baby

Google Reveals Details of a Recently Patched Windows Flaw

15,000 Clients Data Leaked Accidently by a Turkish Firm

Turkey Dog Activity Continues to use COVID Lures

The head of Microsoft announced evidence of the involvement of Russian intelligence in the cyber attack

Finnish IT Firm TietoEVRY Shut Down Following Ransomware Attack

Private Information of 50,000 French Healthcare Workers Stolen

Messenger TeleGuard: The world’s most secure messenger competes against WhatsApp

Total Cookie Protection Launched in The New Upgrade of Firefox

A Crypto Mining Botnet is Abusing Bitcoin Blockchains

Experts listed the methods used by fraudsters to obtain personal data

Apple Patched A Stored XSS Vulnerability In iCloud Domain

Barcode Scanner App Fiasco – ‘New Owner’ Responsible For The Disaster

Bitcoin Slips 17% to $45,000 as Caution Sweeps Over Crypto

How DNS History Contributes to Threat Investigations

Taking Steps to Secure your Application in 2021

Russia Accused by Ukraine for Major Cyber Attacks

FedEx and DHL Express Hit with Phishing Attacks

The Russian created Clubhouse for Android in one day

Malwarebytes Report Confirms the Change in Tactics of Cybercriminals During Covid-19

A Python Vulnerability Could Allow Remote Code Execution Attacks

Brave Browser Tor Mode Leaked .Onion Addresses To ISP – Glitch Fixed

Alert for Smart Phone Users, How Their Data is Extracted by Apps Via Location Tracking

Chinese Hackers Cloned Exploit Tool Belonging to NSA

How to Choose the Right EHS Management Software

Experience-Based Review of Desky Dual Ergo Edge Sit Stand Desk

Bluetooth Overlay Skimmer That Blocks Chip-based Transactions

Fraudsters are Exploiting Google Apps to Steal Credit Card Details

US Agencies Publish Advisory on North Korean Cryptocurrency Malware, AppleJeus

Multiple Vulnerabilities In Ninja Forms WordPress Plugin Could Allow Site Takeovers

Vulnerability In Agora SDK Powering Several Apps Could Allow Spying On Video Calls

LastPass Free Service Changes – Will Only Support Single Device Type Onward

Darknet Markets are Scrambling to Attract Joker’s Stash Clients

Russian state systems are in danger because of Internet Explorer