Social networking platform giant Twitter experienced a global service outage, including India, on Saturday, 17th April at two subsequent times of the day, once…
Cybersecurity Issues
FIN7 Hacking Group Admin U.S.-Prisoned For 10 Years
One of the administrator-level perpetrators of the infamous FIN7 hacker gang has been sentenced to 10 years of prison by the U.S Justice enforcement.…
Juniper Addresses Critical Remote Control Execution (RCE) Vulnerability:
Juniper Networks has recently addressed a critical RCE i.e. Remote Control Execution vulnerability found in Junos OS that could facilitate a threat actor to…
SolarWinds Attack- Russia Openly Accused By U.S., U.K., EU, Canada, and NATO
In the latest developments, the United States officially accused Russia of the massive debacle that the Solarwinds cyberattack was, and gained open backing from…
Malicious RAT Deployed Via Over 100,000 Websites By Hackers
A new RAT i.e Remote Access Trojan has been found that is spreading via more than 100,000 websites that offer malicious documents and PDFs…
SAP Commerce Critical Flaws Patched on SAP Security Patch Day
A critical vulnerability in the SAP Commerce has released a security fix for SAP Security Patch Day, along with several others. Critical remote code…
Microsoft Patch Tuesday- April 2021 Carries Fixes For 108 Vulnerabilities, 5 Zero-Days
Microsoft has delivered its monthly update of security fixes for the Microsoft Patch Tuesday schedule, where a slew of critical and important vulnerabilities have…
Adobe Patches Critical Bugs in Photoshop, Bridge, RoboHelp
Adobe has recently announced security patches for a total of four products that were being affected by security vulnerabilities, including Adobe Photoshop, Bridge, and…
Brave Browser To Not Adopt Google’s FLoC Implementation
The Brave browser has recently come forth to object to Google’s FLoC scheme implementations and has stated that its browser will not execute the…
New Downloader Malware “Saint Bot” Is Spreading Via Emails
A new malware downloader has been discovered by researchers that are using phishing attacks to advance credential infiltrators and other malicious payload malware. The…