• View
Image

Research Reveals More Than 2000 Chrome Extensions Disabled Security Headers

Tens of thousands of Google Chrome extensions accessible from the official Chrome Online Store manipulate security headers on major websites, posing... Read more

Image

WhatsApp's New Privacy Policy: A Quick Look

With the advent of its latest privacy policy, the Facebook-owned messaging app is all set to block certain features if the users won't agree to th... Read more

Image

Japan predicts hacker attack on Tokyo Summer Olympics by Russian hackers

According to Masatoshi Fujitani, head of the Tokyo-based Japan Forum for Strategic Studies (JFSS), the Summer Olympic Games in Tokyo will be the targ... Read more

Image

Plaintext Passwords of 8.3 Million Users Leaked in a DailyQuiz Data Breach

Earlier this year, a cybercriminal exploited the vulnerabilities in the DailyQuiz server and stole personal details of 13 million users, which was th... Read more

Image

Apple Fixes macOS Zero Day Vulnerability, Abused by XCSSET macOS Malware

Apple has released security updates for a variety of its products, including a patch for three macOS and tvOS zero-day vulnerabilities. The patch com... Read more

Image

JSWorm: A Notorious Ransomware

The ransomware threat environment has been shifting over the last few years. Following the major ransomware outbreaks of 2017, such as WannaCry, NotP... Read more

Image

Agrius – The Iranian Hacking Group Targets Israel Using Data Wipers

The hacking community of Agrius has switched from a strictly destructive wiper malware to a mix of wiper and ransomware functions — and pretends to k... Read more

Image

The sharp drop of the cryptocurrency provokes cyber fraudsters

According to cybersecurity experts, the fall in the cryptocurrency exchange rates may cause another increase in DDoS attacks. The fact is that the sa... Read more

Image

How Cybercriminals are Hacking ATM Machines? Here's a Quick Look

Security researchers have published a report on the modus operandi of the cybercriminals who are using malware, a key from eBay, and a Raspberry Pi t... Read more

Image

Ongoing Bitcoin Scams Show Power of Social Engineering Triggers

Over the last seven months, the number of Bitcoin scams has increased dramatically. The scams began around October 2020 and are still going on today.... Read more

Image

Who Could be Behind the Whale Address that Owns Dogecoin Worth $12 Billion?

After the sudden spike in cryptocurrency this year, news outlets and various traders have been thinking about who might be behind the famous and exce... Read more

Image

Zeppelin Ransomware have Resumed their Operations After a Temporary Pause

According to BleepingComputer, the operators behind the Zeppelin ransomware-as-a-service (RaaS), aka Buran, have resumed operations following a brief... Read more

Image

Darkside Ransomware Gang Received Nearly $5 Million as the Extortion Amount from the Victims of Colonial Pipeline Attack

Security experts at London-based blockchain analytics firm Elliptic discovered the bitcoin wallet used by the ransomware group responsible for the Co... Read more

Image

Pipeline Shutdown Shows Need for Tougher Cybersecurity Laws

The six-day shutdown of a key 5,550-mile fuel pipeline earlier this month as a result of a malware attack proved a case study of everything that can... Read more

Image

Smart Plugs Used by Cyber Criminals to Break into Victims Property

Inexpensive intelligent connectors are a big threat to cybersecurity and can effectively be used by cybercriminals to hack anyone’s device or even ga... Read more

Image

DeFi100, a Crypto Project, Allegedly Scammed Investors of $32 Million

According to reports and tweets, DeFi100, a cryptocurrency project, allegedly defrauded investors out of $32 million (roughly Rs. 233 crores). The pr... Read more

Menu