Smart Bulbs: Next big target for cyberattacks?
Researchers at UTSA have recently discovered that invisible wave spectrum in smart bulbs which come equipped with infrared abilities can be taken advantage of...
Blind TCP/IP hijacking is resurrected for Windows 7
Retro cyber-attack returns to haunt widely used, end-of-life OSÂ
Windows 7 remains vulnerable to blind TCP/IP hijacking attacks via a vulnerability that a security researcher...
Database Hacking : Sql Injection
SQL injection is a very common technique for hacking web applications, SQL injection can easily destroy the database of the website.
SQL injection is the...
Grayshift Announces Android Support To Its GrayKey iPhone Hacking Tool
Grayshift, an Atlanta-based startup that made its name with the GrayKey hacking apparatus that breaks Apple's iPhone guards, presently formally does likewise for Google's...
Faulty CrowdStrike Update Crashes Windows Systems, Impacting Businesses Worldwide
Businesses across the world have been hit by widespread disruptions to their Windows workstations stemming from a faulty update pushed out by cybersecurity company...
Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email security vendor Proofpoint's defenses...
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on managing privileged access—rather than securing the accounts and users...
Apple App Store: What’s next?
While the Google Play Store is no stranger to malware-infected apps, the App store seems to be experiencing its first slice of it. Recently,...
A New Generation of Peer-to-Peer Botnets Targeting SSH Servers Worldwide
FritzFrog is a highly sophisticated peer-to-peer (P2P) botnet that has been actively breaching SSH servers worldwide. With its decentralized infrastructure, it distributes control among...
Politics in cyber security
Underplaying of recent cyber attacks in the US indicates politicians, rather than technocrats, taking a hand
Amidst the panic and disorder caused by Covid-19, a...