Airtel denies report of data leak that affected over 2.5 million subscribers

A report prior this week asserted an Airtel information penetrate that influenced as numerous as 2,000,000 endorsers. Delicate data, for example, addresses, Aadhar card...

Vulnerabilities in Popup Builder WordPress Plugin Could Disrupt Over 200K Websites

The imperfection may have allowed aggressors to dispatch out altered pamphlets and erase e-bulletin endorsers from 200,000 influenced sites. Manufacturers of a module, used by...

SonicWall SMA 100 zero-day exploit actively used in the wild

A SonicWall SMA 100 zero-day vulnerability is being actively exploited in the wild, according to a tweet by cybersecurity firm NCC Group. On January 22nd,...

Indian government proposes bill to ban cryptocurrencies

The Indian government will acquaint another bill with boycott exchanging and interests in digital forms of money during the Budget meeting of Parliament. Simultaneously,...

Rocke Group’s Malware Now Has Worm Capabilities

The Pro-Ocean cryptojacking malware now comes with the power to spread sort of a worm, also as harboring new detection-evasion tactics. Researchers have identified an...

A New Wormable Android Malware Spreading Through WhatsApp

Android clients should look out for new wormable malware that spreads through WhatsApp and baits the imminent casualties into downloading an application from a...

Attacks on Individuals Fall as Cybercrime Shifts Tactics

Cybercriminals shifted faraway from stealing individual consumers’ information in 2020 to specialize in bigger, more profitable attacks on businesses, consistent with a report from...

Millions Of Devices Exposed To DNSpooq Vulnerabilities Allowing DNS Hijacking

A great many gadgets could be powerless against Domain Name System (DNS) store harming and far off code execution assaults because of seven security...

Blind TCP/IP hijacking is resurrected for Windows 7

Retro cyber-attack returns to haunt widely used, end-of-life OS  Windows 7 remains vulnerable to blind TCP/IP hijacking attacks via a vulnerability that a security researcher...

Sudo vulnerability allows attackers to gain root privileges on Linux systems

A weakness (CVE-2021-3156) in sudo, an incredible and close pervasive open-source utility utilized on significant Linux and Unix-like working frameworks, could permit any unprivileged...