More than 65,000 users had their personal data exposed after an online gaming site misconfigured the Elasticsearch server they were sitting on. The affected…
Cybersecurity News
International security forces expose Emotet malware
Security forces around the globe have reportedly been successful in taking down a network of what is described as the ‘world’s most dangerous malware…
DanaBot trojan back after staying under the radar for months
A new version of the infamous DanaBot trojan has been discovered by researchers and it seems to be raising serious concerns. Observing the pattern…
Software bug in British PNC system deletes 15,000 arrest records
In a rather shocking revelation of events, it has come to the attention that a major software bug in the British Police National Computer…
Microsoft shares details regarding the infamous SolarWinds attack
On the 20th of January, in a recent report from Microsoft, details regarding the SolarWinds supply-chain attack were shared. The report came as a…
Application bugs crawling in several video calling apps
By now, all of us become well informed of the benefits of the multiple video calling apps. With the ever-increasing integration of these handy…
New bug in Google: whilst using the custom date range, the tab freezes
A bug in Google Search is making a program tab freeze while looking between a predefined scope of dates. Google has an inquiry or…
Wary the (skills) gap: The pool of Cybersecurity needs to expand to benefit from opportunities of Quantum computing
Specialists at the CES 2021 gathering pressure significance of security training, The “second age” registering of quantum computing is ready to carry an abundance…
Hacker group publishes 1.9 Million users’ data stolen from photo editing app Pixlr
As the use of photo editing and enhancing software has increased, so has the influx of tons of free photo editing apps. Both, professional…
Windows 10 Finger command exploited through phishing for malware download
Hackers are utilizing the typically innocuous Windows 10 Finger command to download and install vindictive indirect access on casualties’ gadgets. The ‘Finger’ command is…