Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution

A critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP) SSH implementation that could permit an attacker to execute arbitrary code...

Chinese Hackers Targeting Indian Government Websites

Indian security organizations are worried over the most recent improvement in which the United States Department of Justice has said that five Chinese programmers...

Big Basket Data Leak : Over 1.5 crore User Details Sale on Dark Web

Staple online business stage Bigbasket has confronted potential information penetrate which might have spilled subtleties of its around 2 crore clients, as indicated by...

Foxconn suffers a Ransomware attack; $34 million Ransom demanded

Foxconn endured a ransomware assault at its Mexican office over the Thanksgiving weekend, by DoppelPaymer ransomware pack. Foxconn is the biggest hardware producing organization, with...

Police dismantle world’s ‘most dangerous’ criminal hacking network

International law enforcement agencies said on Wednesday they had dismantled a criminal hacking scheme used to steal billions of dollars from businesses and private...

LogoFAIL: UEFI Vulnerabilities Expose Devices to Stealth Malware Attacks

The Unified Extensible Firmware Interface (UEFI) code from various independent firmware/BIOS vendors (IBVs) has been found vulnerable to potential attacks through high-impact flaws in...

Researchers Unveal GuLoader Malware’s Latest Anti-Analysis Techniques

Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make analysis more challenging."While GuLoader's core...

Researchers Unmask Sandman APT’s Hidden Link to China-Based KEYPLUG Backdoor

Tactical and targeting overlaps have been discovered between the enigmatic advanced persistent threat (APT) called Sandman and a China-based threat cluster that's known to...

New MrAnon Stealer Malware Targeting German Users via Booking-Themed Scam

A phishing campaign has been observed delivering an information stealer malware called MrAnon Stealer to unsuspecting victims via seemingly benign booking-themed PDF lures."This malware...

Webinar: The Art of Privilege Escalation – How Hackers Become Admins

In the digital age, the battleground for security professionals is not only evolving, it's expanding at an alarming rate. The upcoming webinar, "The Art...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts