smart bulb

Smart Bulbs: Next big target for cyberattacks?

Researchers at UTSA have recently discovered that invisible wave spectrum in smart bulbs which come equipped with infrared abilities can be taken advantage of...

Blind TCP/IP hijacking is resurrected for Windows 7

Retro cyber-attack returns to haunt widely used, end-of-life OS  Windows 7 remains vulnerable to blind TCP/IP hijacking attacks via a vulnerability that a security researcher...

Database Hacking : Sql Injection

SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website. SQL injection is the...

Grayshift Announces Android Support To Its GrayKey iPhone Hacking Tool

Grayshift, an Atlanta-based startup that made its name with the GrayKey hacking apparatus that breaks Apple's iPhone guards, presently formally does likewise for Google's...

Faulty CrowdStrike Update Crashes Windows Systems, Impacting Businesses Worldwide

Businesses across the world have been hit by widespread disruptions to their Windows workstations stemming from a faulty update pushed out by cybersecurity company...

Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails

An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email security vendor Proofpoint's defenses...

Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority

Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users...
app store

Apple App Store: What’s next?

While the Google Play Store is no stranger to malware-infected apps, the App store seems to be experiencing its first slice of it. Recently,...

A New Generation of Peer-to-Peer Botnets Targeting SSH Servers Worldwide

FritzFrog is a highly sophisticated peer-to-peer (P2P) botnet that has been actively breaching SSH servers worldwide. With its decentralized infrastructure, it distributes control among...

Politics in cyber security

Underplaying of recent cyber attacks in the US indicates politicians, rather than technocrats, taking a hand Amidst the panic and disorder caused by Covid-19, a...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts