Latest News
New EU Protocol Preps for X Border Cyber-Attacks
Before the next WannaCry or NotPetya cyber-attack strikes, potentially resulting in widespread damage for which few are actually prepared, law
What is DNS Attack and How Does it Work?
DNS Attack is a type of cyber attack that exploit the weakness or vulnerability in Domain name system. Today, the
Massive Attacks Bypass MFA on Office 365 and G Suite accounts via IMAP Protocol
Threat actors targeted Office 365 and G Suite cloud accounts using the IMAP protocol to bypass multi-factor authentication (MFA). Over
Zero-Day Flaws in Counter-Strike 1.6 Exploited by Malicious Servers to Hack Players Computer
Hackers exploiting zero-day vulnerabilities in Counter-Strike 1.6 game client to infect player’s devices by using a malicious gaming server and
Hackers Using Steganography to Drop the Powload Malware & Hide Their Malvertising Traffic
Cyber criminals now approaching a unique way to spread Powload malware with the help of steganography to infect the targeted
Experts Uncovered a Malspam Campaign using Boeing 737 Max Crashes
Experts at the 360 Threat Intelligence Center uncovered a new malspam campaign that leverages the tragic Boeing 737 Max crash
Gnosticplayers Offers 26 Million New Accounts for Sale on the Dark Web
The hacker gnosticplayers is offering the fourth batch of millions of records stolen from 6 new websites for sale on
Is this website Safe : How to Check Website Safety to Avoid Cyber Threats Online
Is this website safe ? In this digital world, Check website safety is most important concern since there are countless
138 Android Anti Virus Apps are Frauds in Play Store – Only 23 Apps Performed 100% Malware Detection
Recent In-depth analysis against Android Antivirus in Google play store reveals that, 138 Android antivirus products are completely fake and
Secur Solutions Group Data Leak Exposes 800,000 Singapore Blood Donors
Secur Solutions Group data leak – Another clamorous data leak made the headlines, personal information of 808,201 blood donors in
250,000 Sensitive Legal Documents Leaked Online via Unprotected Elasticsearch Cluster
Security researchers discovered 257,287 legal documents from unprotected Elasticsearch cluster that hosted on a US-based Amazon AWS server. The unprotected
EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using Firewall
Network Firewalls acts as a fortification to keep the internal corporate network secure. Many people often think as it is
Top 10 Best Proxy Server 2019 & Important Methods to Prevent Yourself From Hackers
Best Proxy Server has been used in enormous cases where some personal data or information have been misused illegally against
Experts Published Details of the Actively Exploited CVE-2019-0808 Windows Flaw
Experts from Qihoo 360 disclosed technical details of the actively exploited Windows zero-day flaw CVE-2019-0808 recently patched by Microsoft. Researchers
GlitchPOS PoS Malware Appears in the Cybercrime Underground
A new piece of PoS malware appeared in the threat landscape, the malicious code dubbed GlitchPOS has been found on
DMSniff POS Malware Uses DGA to Stay Active
Researchers have discovered a rare strain of POS malware which uses a domain generation algorithm (DGA) to maintain persistence. Flashpoint‘s