Latest News

Using the Human Factor in Cyber Attacks

The Human Factor has a fundamental importance for the success of a cyber attack, for this reason it is important

Ransomware Attack on the Cleveland Hopkins International Airport in U.S – Lessons learned

Cleveland Hopkins International Airport In U.S fell victim to a cyber attack on April 29th and officials have confirmed its

Xerosploit – Pentesting Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks

Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different

Most of the Dell Computers Vulnerable to Remote Hack Through Pre-Installed SupportAssist Software

A critical remote code execution vulnerability that exists with SupportAssist Client software allows attackers to gain access to vulnerable machines

New Exploits Target Components of SAP Applications

New exploits have been targeting SAP systems, allowing attackers to fully compromise the platform and delete all business application data,

TinyPOS: Handcrafted Malware in Assembly Code

Legacy software vulnerabilities have created opportunities for hackers to steal credit card data and other personal information using tiny point

Hackers Used PowerShell Modules and Hacking Tools for Remote Access & Post-exploitation to Hack Wipro

India’s leading outsourcing giant, Wipro, confirmed the security breach earlier this month as the company Employees’ were subjected to very

UK Government Intros Landmark IoT Security Proposals

The UK government has introduced a proposed new law designed to improve IoT security-by-design and demand that retailers can only

Consumers Revolt Over IoT Security Shortcomings

The Internet Society is urging IoT manufacturers to build stronger security measures into devices after releasing new research revealing that

Brute-Force Attempts More Common on Edge Devices

As edge devices continue to be the target of malicious attacks, security experts have found an increase in brute-force attempts,

Victims of ZQ Ransomware Can Decrypt Their Files for Free

Good news for the victims of the ZQ Ransomware, security experts at Emisisoft have released a free decryptor tool. Good

Hackers Use GitHub to Host Malware to Attack Victims by Abusing Yandex Owned Legitimate ad Service

Threat actors distribute malware by posting malicious ads that redirect users to the websites that offering malicious downloads disguised as

Citrix Internal Network Hacked and Access the Most Sensitive Data for 6 Month by Unknown Hackers

Citrix finally confirms that the cybercriminals successfully compromised their internal network and accessed the most sensitive files also they removed

Top Reasons Let Hackers Compromise the Healthcare Industry that Leads to Data Breaches

In recent times we have seen a numerous number of cyber attacks targeting the healthcare firm. For example the case

Most Firms Rely on Trust Alone for Supply Chain Security

Around 70% of global organizations could be at risk from supply chain attacks because they don’t have enough visibility into

Hackers Tricks You With Advanced Phishing Attack using Fake Address Bar on Chrome for Android

A new form of a sophisticated phishing attack on Android Chrome let hackers hide the original address bar’ screen space