Corporate Credentials on Sale

The Iranian APT gathering has been assaulting corporate VPNs over the previous months and was as of late observed selling corporate-organize accreditations on programmer...

Setup Proxychains in Linux

What is Proxychains? Proxychains is a tool that forces any TCP connection made by any given application to go through proxies like TOR or any...

Hackers are Silently Piercing Through Retail Organizations

The coronavirus epidemic has caused a sudden shift to online shopping. Taking advantage of this boom, attackers are regularly attempting to break into the...

China’s MIIT Introduces Color-Coded Action Plan for Data Security Incidents

China's Ministry of Industry and Information Technology (MIIT) on Friday unveiled draft proposals detailing its plans to tackle data security events in the country...

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor

The Iranian-origin threat actor known as Charming Kitten has been linked to a new set of attacks aimed at Middle East policy experts with...

Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

An Indian national has pleaded guilty in the U.S. over charges of stealing more than $37 million by setting up a website that impersonated...

RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability

The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting Palo Alto Networks firewalls to its exploit...

New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data

Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an aim to steal financial information."BlankBot features a range...

Czech Mobile Users Targeted in New Banking Credential Theft Scheme

Mobile users in the Czech Republic are the target of a novel phishing campaign that leverages a Progressive Web Application (PWA) in an attempt...
smart bulb

Smart Bulbs: Next big target for cyberattacks?

Researchers at UTSA have recently discovered that invisible wave spectrum in smart bulbs which come equipped with infrared abilities can be taken advantage of...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts