Latest News
Using the Human Factor in Cyber Attacks
The Human Factor has a fundamental importance for the success of a cyber attack, for this reason it is important
Ransomware Attack on the Cleveland Hopkins International Airport in U.S – Lessons learned
Cleveland Hopkins International Airport In U.S fell victim to a cyber attack on April 29th and officials have confirmed its
Xerosploit – Pentesting Toolkit to Perform MITM, Spoofing, DOS, Images Sniffing/Replacement, WD Attacks
Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different
Most of the Dell Computers Vulnerable to Remote Hack Through Pre-Installed SupportAssist Software
A critical remote code execution vulnerability that exists with SupportAssist Client software allows attackers to gain access to vulnerable machines
New Exploits Target Components of SAP Applications
New exploits have been targeting SAP systems, allowing attackers to fully compromise the platform and delete all business application data,
TinyPOS: Handcrafted Malware in Assembly Code
Legacy software vulnerabilities have created opportunities for hackers to steal credit card data and other personal information using tiny point
Hackers Used PowerShell Modules and Hacking Tools for Remote Access & Post-exploitation to Hack Wipro
India’s leading outsourcing giant, Wipro, confirmed the security breach earlier this month as the company Employees’ were subjected to very
UK Government Intros Landmark IoT Security Proposals
The UK government has introduced a proposed new law designed to improve IoT security-by-design and demand that retailers can only
Consumers Revolt Over IoT Security Shortcomings
The Internet Society is urging IoT manufacturers to build stronger security measures into devices after releasing new research revealing that
Brute-Force Attempts More Common on Edge Devices
As edge devices continue to be the target of malicious attacks, security experts have found an increase in brute-force attempts,
Victims of ZQ Ransomware Can Decrypt Their Files for Free
Good news for the victims of the ZQ Ransomware, security experts at Emisisoft have released a free decryptor tool. Good
Hackers Use GitHub to Host Malware to Attack Victims by Abusing Yandex Owned Legitimate ad Service
Threat actors distribute malware by posting malicious ads that redirect users to the websites that offering malicious downloads disguised as
Citrix Internal Network Hacked and Access the Most Sensitive Data for 6 Month by Unknown Hackers
Citrix finally confirms that the cybercriminals successfully compromised their internal network and accessed the most sensitive files also they removed
Top Reasons Let Hackers Compromise the Healthcare Industry that Leads to Data Breaches
In recent times we have seen a numerous number of cyber attacks targeting the healthcare firm. For example the case
Most Firms Rely on Trust Alone for Supply Chain Security
Around 70% of global organizations could be at risk from supply chain attacks because they don’t have enough visibility into
Hackers Tricks You With Advanced Phishing Attack using Fake Address Bar on Chrome for Android
A new form of a sophisticated phishing attack on Android Chrome let hackers hide the original address bar’ screen space