Posts

Showing posts from March, 2022

Soaring Ransomware payments, consistent infections, deceptive URLs and more in this year’s 2022 BrightCloud® Threat Report

A mitmproxy Vulnerability Could Allow HTTP Request Smuggling Attacks

The State of Malware Analysis and Responses to Emerging Threats

Critical Vulnerability Affecting Western Digital My Cloud OS 5 Devices – Patch Now

Researchers release car exploit that allows hackers to lock, unlock and start Honda’s

Six Ways to Improve Infosec in 2022

Severe XSS Vulnerability Found In Microweber CMS

Sophos Fixed A Critical RCE Vulnerability In Sophos Firewall

Trojanized Crypto Wallets Flood Android And iOS App Stores

Latest Google Chrome Update Fixed Another Zero-Day Flaw

Azurite – An Azure AD Enumeration Tool

Be Aware of What is Out There in Cybersecurity Threats and Protection 2022

Facestealer Spyware Fooled 100K+ Users On Google Play Store

Most Important Facts You Need To Know About Cyber Security in the Cloud

How To Do Preemptive Cybersecurity 

A Review of SecuX V20 Hardware Crypto Wallet

Browser-in-The-Browser Attack – A New Phishing Strategy

In Cyber Warfare, Everyone Worldwide Can Become Collateral Damage

Researchers Find CryptoRom Scam Active Via Sideloaded Apps

VPN For Streaming – Do You Need One?

Critical Remote Code Execution Vulnerability Found In Parse Server

Hacking Robots: The Future of Production Poses a Security Risk

Banking Trojan ‘Escobar’ replaces ‘AbereBot’ With New Capabilities

Hackers Spread BazarBackdoor Malware Via Website Contact Forms

How Does Blockchain Impact the Financial Industry?

Vulnerabilities In Pascom Phone System Could Allow RCE Attacks

Legacy System Modernization

Smartproxy– An Intelligent Proxy Service

Stellar Repair for Access

Importance Of Data Protection In 2022

3 Ways the Cybercriminals Getcha & How to Be Prepared

UK Ferry Service Wightlink Admitted Data Breach

SSL Certificates and PKI Management For Better Your Web Security

Sparta- A Network Scanning and Enumeration Tool

Legion By GoVanguard- An Automated Reconnaissance Tool

1Password Raise Bug Bounty Rewards To $1 Million

Watch Dogs – An Entertaining Simulation of a Fantasy Hacking World

SharkBot Android Trojan Mimics Legit Apps To Appear On Google Play Store

Surfshark Review: A Robust Online Privacy Solution On Budget

SQL Injection Vulnerability Discovered in Moodle

Microsoft Patch Tuesday March Addressed 71 Bugs Including 3 Zero-Day

Linux Dirty Pipe Exploit Gives Root Access – Patch Now

Tech Advancements That are Boosting Cybersecurity

After NVIDIA, Samsung Are The Next Victims Of Data Theft

Chrome Skype Extension Flaw Threatened User Privacy

NVIDIA Cyberattack Update: Employee Credentials Exposed

Cybercrime Lurks During Tax Season with New Rules Around Cryptocurrency

Hacking iOS vs Android: Which Generates Most Interest?

An in-Depth Guide to Lateral Movement in Cybersecurity

c41n- An Automated Rogue WiFi Access Point Creator

BinGoo- A Command Line Dorking Tool

Bridgestone Americas At A Standstill After Facing Cyberattack

Why You Should Never Use a Free Proxy Server?

Mip22- A Phishing Tool for Linux and Android

NVIDIA Partially Confirms A Cyberattack As It Admitted ‘Investigations’

Zenly App Vulnerabilities Could Allow Account Takeover