Privileged accounts have access to the most valuable corporate information, which is why they are often targeted by attackers. As a result,...
Outer space’s first-ever cyber crime? It seems so. The US space agency NASA (National Aeronautics and Space Administration) has confirmed that it...
Hostinger announced a major data breach that affected nearly 14 million customers, and it reset all the client’s password as a precaution...
Researchers discovered multiple critical vulnerabilities in Picture Transfer Protocol (PTP) that allows attackers to infect the Canon DSLR camera with ransomware to...
While we take internet access for granted, there are several regions in the world where people have little or censored access to...
Web application security specialists have reported the finding of a new vulnerability in Apple’s new operating system iOS 13 beta version which,...
Sprint Corporation, an American telecommunications company has announced that it has suffered a data breach after unknown hackers accessed customer accounts credentials...
Ethical hacking specialists from cybersecurity firm Symantec reported the discovery of a vulnerability that, if exploited, would allow a hacker to access...
We have seen how many of the Android apps have been caught indulging in malicious practices and the most recent study reveals...
Researchers uncovered a new malware dropper called AndroMut from one of the infamous APT group TA505 to drop the FlawedAmmyy Remote Access...
Researchers from cybersecurity firm Check Point have uncovered a Facebook campaign that has been spreading malware since 2014. The campaign was operating...
Role-Based Access Control, or what is simply known as RBAC, provides the ability to restrict access to certain systems based on the...
Network security specialists claim that a hacker group working for China’s Ministry of State Security hacked the networks of eight of the...
IT systems audit specialists reported a critical vulnerability in the Cisco Digital Network Architecture Center (DNA) that, if exploited, could allow a...
A new malware dubbed Plurox spread itself over the local network using EternalBlue exploit and let attackers gain access to the network...
Loki is a Remote Access Tool/Botnet & uses RSA-2048 with AES-256 to keep your communication secure. Requirements Python 3.6.x | 3.7.x Server...
There are many Raspberry Pi accessories available in the market but there are very few boards that are as cool and useful...
Critical Bug in Medical Infusion Pumps lets Attacker Remotely install Unauthorized Firmware to Change Medication Dosages. Researchers at CyberMDX, a healthcare security...
A new sophisticated, unique Linux malware dubbed HiddenWasp used in targeted attacks against victim’s who are already under attack or gone through...
A tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access. Evil limiter employs ARP...
A couple of weeks ago Microsoft released a security patch to fix a remote-code execution vulnerability in its Remote Desktop Protocol (RDP)...