April 25, 2024
CyberSecurity Technology

Chinese Hackers Exploited Recent Fortinet Flaw

Suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks which are targeting a European government entity and a managed service provider (MSP)that is located in Africa. Telemetry evidence gathered by Google-owned Mandiant indicates that the exploitation is occurred as early as October 2022which is at least […]

Read More
Articles CyberSecurity Technology

Warning for Android Users,New Hook Malware with RAT Capabilities Emerges

The threat actor behind the BlackRock and ERMAC Android banking trojans has uncovered yet another malware for rent called Hook which introduces new capabilities to access files that are stored in the devices and create a remote interactive session. Hook as a novel ERMAC fork which is advertised for sale for $7,000 per month while […]

Read More
Articles CyberSecurity Technology

WhatsApp Fined €5.5 Million for Violating Data Protection Laws

The Irish Data Protection Commission imposed fresh fines of €5.5 million against Meta’s WhatsApp for violating data protection laws which was processing users’ personal information. Main point of focus of the ruling is an update to the messaging platform like whatsapp Terms of Service which was imposed in the days which leads enforcement of the […]

Read More
Articles CyberSecurity Technology

Raccoon and Vidar Stealers Spreading through Massive Network of Fake Cracked Software

A resilient infrastructure comprising over 250 domains used to distribute information-stealing malware such as Raccoon and Vidar since early 2020. The infection chain uses about a hundred of fake cracked software catalogue websites which are redirect to several links before downloading the payload hosted on file share platforms such as GitHub.It led to distribution of […]

Read More
Articles CyberSecurity Technology

Malware Attack on CircleCI Engineer’s Laptop

DevOps platform CircleCI disclosed that unidentified threat actors compromised an employee’s laptop and leveraged malware to steal their two-factor authentication-backed credentials to breach the company’s systems and data last month. The sophisticated attack took place in mid December 2022 and that the malware went undetected by its antivirus software led to malware attack on laptop […]

Read More
CyberSecurity Technology

Cisco warned for unpatched vulnurabilities in EoL Buisness routers

Cisco warned of two security vulnerabilities which affects end-of-life Small Business RV016, RV042, RV042G, and RV082 routers which will not be fixedaccording to them as it acknowledged the public availability of proof-of-concept exploit. The issues of cisco are present in the routers web-based management interface which enables a remote adversary to sidestep authentication which malicious […]

Read More
Articles CyberSecurity Technology Videos

TIKTOK FINED FOR VIOLATING COOKIE LAWS

Popular short video making app TikTok has been fined about €5.4 million by the French data protection supervised agency for breaking cookie consent . Tiktok become the latest platform to face such penalties after Amazon, Google, Meta, and Microsoft since 2020.Users of tiktok have not refused cookies as easily as accepting them and they were […]

Read More
Articles CyberSecurity Technology Uncategorized

Twitter has denied leaking data rumors

Twitter has cleared that through investigation ,it doesnt found any users’ data sold online by hacking its systems. Based on investigations which are carried out by twitter no such evidence is found which shows hacking in its system and leaking of user’s data ,this is claimed by twitter. This comes forward because of multiple reports […]

Read More
CyberSecurity

Trending 2022 TikTok ‘Invisible Challenge’ is used by Hackers to Spread Malware

Trending TikTok ‘Invisible Challenge’ is used by Hackers to Spread Malware Tiktok is not spared from being the platform of virus spread. Threat actors are exploiting on a popular TikTok challenge to trick users into downloading information-stealing malware, according to new research from Checkmarx. The trend goes by the name Invisible Challenge and it involves […]

Read More
CyberSecurity

J-K digital vision document launched during the 2-day National Conference on e-governance

J-K digital vision document launched during the 2-day National Conference on e-governance The two-day National Conference on e-governance concluded here in Jammu and Kashmir on Sunday. The conference witnessed the launch of J&K digital vision document and J&K Cyber security policy. Along with this, the event also witnessed a historic Memorandum of Understanding (MoU) signed […]

Read More
en_USEnglish