Security Three ransomware attacks were launched against a supplier to the automotive… Somya Agrawal Aug 11, 2022
Security Mexico-based marketplaces claiming to be dedicated online portals for notorious… Somya Agrawal Aug 11, 2022
Security A new large-scale phishing campaign abuses Microsoft Azure, Google Sites to steal… Pavan Naidu Aug 11, 2022
Web & Social Media Google Workspace now has stronger protection that will automatically block… Pavan Naidu Aug 10, 2022
Security A hacker claims to have gained network access at the central bank Somya Agrawal Aug 10, 2022
Security CISA adds two new bugs to their Known Exploited Vulnerabilities catalog Blossom Hazarika Aug 10, 2022
Security Personal data of one million students from Kashmir University hacked Pavan Naidu Aug 10, 2022
Security VMware warns chances of public exploit for critical authentication bypass flaw Blossom Hazarika Aug 9, 2022
Security IBM Fixes Critical Vulnerabilities in Voice, Security, and Cloud Services Kaushiki Ghosh Aug 9, 2022
Security Kaspersky researchers made link between Maui ransomware operation and… Blossom Hazarika Aug 9, 2022
Security Dracarys Android malware is installed by hackers using a disguised Signal app Kaushiki Ghosh Aug 9, 2022
Security A new list has appeared of pro Ukraine and pro Russian hackers, Reports Pavan Naidu Aug 9, 2022
Security North Korean hackers exploited the Tornado Cash cryptocurrency mixer, which the US… Kaushiki Ghosh Aug 8, 2022
Security Chinese hackers reportedly uses new Windows malware to backdoor govt. defense… Blossom Hazarika Aug 8, 2022
Security Following an employee SMS phishing attack, Twilio announces a data breach Kaushiki Ghosh Aug 8, 2022
Security List of 2021’s Top Malware as per US, Australian Cybersecurity agencies Pavan Naidu Aug 8, 2022