Google Speech-to-Text API Can Help Attackers Easily Bypass Google reCAPTCHA

An old assault technique going back to 2017 that utilizations voice-to-text to sidestep CAPTCHA assurances ends up stilling work on Google's most recent reCAPTCHA...

Malware uses WiFi BSSID for victim identification

Malware authors are using the WiFi AP MAC address (also referred to as the BSSID) as how to geo-locate infected hosts. Malware operators who want...

AutoHotkey-Based Password Stealer Targeting US, Canadian Banking Users

Danger entertainers have been found conveying another accreditation stealer written in AutoHotkey (AHK) scripting language as a feature of a progressing effort that began...

Pak-based terror groups resort to cyber recruitment in J&K

Pakistan’s intelligence and terror groups are now completing recruitment in Jammu and Kashmir using applications in cyber and mobile space as direct physical interactions...

Backdoor account found in more than 100,000 Zyxel firewalls, VPN gateways

The username and password (zyfwp/PrOw!aN_fXp) were visible in one among the Zyxel firmware binaries. More than 100,000 Zyxel firewalls, VPN gateways, and access point controllers...

Indigo Says Its Servers Hacked During Early Days Of December

IndiGO on Thursday expressed that its workers were hacked during the beginning of December, and didn't preclude the likelihood that programmers may transfer some...

Politics in cyber security

Underplaying of recent cyber attacks in the US indicates politicians, rather than technocrats, taking a hand Amidst the panic and disorder caused by Covid-19, a...

140GB of confidential data from US-based door parts distributor leaked on hacker forum

A 140GB chronicle that purportedly has a place with Door Controls USA, a US-based entryway parts shop, has been spilled on a well known...

A Google Docs Bug Could Have Allowed Hackers See Your Private Documents

Google has fixed a bug in its criticism apparatus fused across its administrations that could be misused by an aggressor to conceivably take screen...

Citrix confirms a DDoS Attack impacting Citrix ADC’s

Citrix has affirmed today that a continuous 'DDoS assault design' utilizing DTLS as an enhancement vector is influencing Citrix Application Delivery Controller (ADC) organizing...