Leaks

DDoS Attackers

Ring Android app flaw allowed access to camera recordings

In the Amazon Ring app for Android, Amazon has patched a high-severity vulnerability that may have let hackers download customers’ recorded camera footage. The flaw was spotted and reported to…

Read More
Understanding What Is Malware Analysis

North Korean hackers target crypto experts with fake Coinbase job offers

North Korean hackers use phoney Coinbase job offers to target cryptocurrency professionals. The renowned North Korean hacking outfit Lazarus has uncovered a new social engineering scheme in which the hackers…

Read More
Open EDR
36TB Data Breach The Culprit Lenovo’s Obsolete Iomega NAS

Over 1 Billion Individual Data Leaked Due to Alleged Chinese Police Database Hacking

In a leak that, if verified, could be one of the biggest data breaches in history, hackers might have obtained a wealth of information belonging to over I billion Chinese…

Read More
Understanding What Is Malware Analysis

This New Malware Is Now a Favorite among Ransomware Gangs

According to cybersecurity researchers, the bumblebee loader is now a darling in the ransomware ecosystem.  A new malware is now an important component when it comes to engineering ransomware attacks….

Read More
technology drone

The Great Resignation in the Tech Sector and Tips to Solve the Issue

Human resource managers are finding it hard to close the growing skills disparities in their companies. For many, the issue is that the conventional method of addressing skills shortages has…

Read More
LibreOffice OpenOffice Remote Code Execution Vulnerability Biting Casual Users

Attackers Can Exploit Critical Citrix ADM Vulnerability to Reset Admin Passwords

Citrix announced on Tuesday that Citrix Application Delivery Management (ADM) has a serious vulnerability that might allow an unauthorized attacker to enter as administrator. Citrix ADM is a centralized management…

Read More
What Is Application Control — Types and Benefits

Owl Labs Patches Awful Exposure in Video Conferencing Applications

Owl Labs, an organization that deals in video conferencing, has announced severe exposure to its devices, including the Whiteboard Owl and Meeting Owl Pro. These two software allow people to…

Read More
Bad Actors Still Raking Profit From Ransomware 1

A Ransomware Group Claims to Have Breached the Foxconn Factory

Malicious hackers claim to have hacked into the network system of the Foxconn Baja factory in Mexico on June 11. using the LockBit 2.0 ransomware to conduct the cyber-attack, the…

Read More
Quick Guide on How to Fix Chrome’s ‘ERR SSL PROTOCOL ERROR’

Chrome 102 Patches 32 Vulnerabilities

Google is preparing to promote Chrome 102 to take its place after releasing Chrome 101 just over a month ago. The new Chrome release is chock-full of developer-oriented features, which…

Read More
A DoS Flaw That Could Help Take Down WordPress Websites

Large-Scale Attack Targeting Tatsu Builder WordPress Plugin

Hackers are reportedly targeting WordPress sites that use an unknown security version of the Tatsu no-code website builder plugin. As part of a massive attack attacking a vulnerability in the…

Read More

Page 4 of 12

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register