According to researchers at cybersecurity firm Resecurity, hackers have gained access to the computer network of the United Nations and stolen data. A UN…
Cybersecurity
Texas Right to life website expose Job applications
It was discovered that hundreds of job applicants’ personal information had been compromised due to a glitch on Texas Right to Life website that…
Ragnar Locker Ransomware gang threatens to release stolen data
Using a new method, the Ragnar Locker ransomware gang threatens to release the stolen data if the victim does not pay the ransom. It…
Remote Code Execution Security gap fixed by NPM package
An extremely well-known NPM bundle called ‘pac-resolver’ for the JavaScript programming language has been fixed to address a remote code execution gap that could…
IoT attacks : doubling in six months.
More than 100 percent more IoT devices were attacked in the first six months of 2021, according to researchers. After analyzing its honeypot telemetry,…
Playbook by Ransomware-as-a-Service provider Leaked Source Code
According to researchers, Conti, the group that provides ransomware as a service (RAAS), just exposed their playbook. In addition to the Cobalt Strike handbook…
Conti Playbook leaked: Did you hear about it?
Analysts as of late got a playbook that was leaked connected to Conti, the Ransomware-as-a-Service (RaaS) gang. It has uncovered plenty of data about…
USB Malware drops using device invented by UK
The United Kingdom researchers say that the device will reduce the risk of harmful USB malware. With a patent from the Indian government, the…
Email is still vulnerable: Brute Force Attacks increasing
Emails are still a viable attack vector, despite the fact that phishing techniques are constantly being improved. Threat actors are using brute force attacks…
Quantum Security feature Freeze by Google due to vulnerable middleware
Google said earlier in the week that it briefly shut off its quantum security include in Chrome after it got bug reports that defective…