SSID Stripping has emerged as a significant threat because it impacts almost all software platforms, including MS Windows, macOS, Apple iOS, Ubuntu,...
The infection chain starts when the victim clicks on an ad from Google on the search results page. SentinelLabs researchers have identified a...
Romania-based cybersecurity firm Bitdefender has released the much-awaited universal decryptor for REvil ransomware victims in collaboration with an undisclosed but trusted law...
Kali Linux 2021.3, comes with a range of new pentest tools, improved virtualization support, and a brand-new OpenSSL configuration to enhance the...
The infamous Mirai botnet lets threat actors use compromised devices to carry out large-scale and crippling DDoS attacks. Critical Microsoft Azure vulnerabilities...
Originally, Jupyter infostealer is known for stealing data from popular browsers like Chrome and Firefox. In 2020, Hackread reported about Jupyter, a trojan...
Despite the disagreement of companies such as Apple and Mozilla, Google security teams released the Chrome 94 update for Android devices and...
The Windows Subsystem for Linux (WSL) is a companion feature released by Microsoft in 2016 to run a Linux image in a...
Recent security reports indicate that the results of COVID-19 tests conducted by the pharmaceutical company Walgreens could be exposed to threat actors....
In a controversial decision, the U.S. Department of Justice (DOJ) announced that it reached an agreement with three former US intelligence agents,...
WhatsApp has lots of little-known functions, although an Internet search is enough to master these techniques. An example is a function to...
The official .Onion website of REvil ransomware gang is back online while its chat platform and clearnet site is still offline. The...
Some fake piracy websites have also been found distributing Crypto Bot and Raccoon Stealer malware in cracked software. Sophos Labs’ security researchers...
Fortinet VPN users are urged to reset their passwords as the company has acknowledged the data to be legitimate. Popular network security...
Currently, there is no evidence that this particular Azure vulnerability was exploited to gain unauthorized access to customer data. In its newest blog...
Endpoint security threats are usually targeted towards corporate organizations but can often use private individuals to get inside these companies – Let’s...
Yandex, a Russia-based technology and search engine giant, has confirmed that its servers were targeted with cyber history’s largest DDoS attack last...
S.O.V.A. Android banking trojan is actively being advertised on Russian hacker and cybercrime forums. In early August 2021, ThreatFabric’s team of researchers...
Since its mass adoption as an instant messaging platform, WhatsApp has been a tool widely used by cybercriminal groups to deploy some...
Mobile devices, while convenient tools for communication and engagement, also come with their fair share of security risks — particularly when it...
Originally, O.MG Cable was introduced in 2019. In 2019, at DEFCON, an IT security researcher going by the online handle of MG...