A threat actor who has targeted the Middle East in the past has developed its Android mobile Spyware. The advanced Android mobile spyware is…
Cybersecurity
Cybercrime growth highlights IBM report
A devolution survey underscores the gravity of cyberattacks. The aggregate global cybercrime totalled $16.4 billion each day The average data breach cost of firms,…
Ethical Hackers prevent $27bn cybercrime
A report by California crowdsourced cybersecurity platform Bugcrowd states that ethical hackers have warded off $27bn worth of cybercrime during the COVID-19 pandemic. The…
HTML smuggling targets Banking industry
Microsoft reported HTML smuggling, which spread via email, had been extensively targeting banking organizations. Microsoft described the attack that surfaced in the early half…
Zoom vulnerability by Positive Technologies
The U.S-sanctioned Positive Technologies has underscored three vulnerabilities in the zoom, Zoom vulnerability that can be used for crashing or hijacking on-prem parts of…
FBI email system hacked, false cybersecurity alerts sent to thousands
The FBI reported threat actors taking over FBI email system to send thousands of false messages about a “sophisticated chain attack.” Threat intelligence non-profit…
MacOS Vulnerability Target Hong Kong
Google researchers have detected a zero-day MacOs vulnerability in operating system. The hackers have targeted Hong Kong websites of a media outlet and pro-democracy…
GlobalProtect VPN: Zero Day Disclosure
Palo Alto’s network GlobalProtect VPN has a new zero-day vulnerability reported by researchers. The vulnerability allows the hacker to use an unauthenticated network to…
Busybox Linux utility Vulnerabilities uncovered
Cybersecurity researchers discovered 14 critical vulnerabilities in the BusyBox Linux utility. The hackers can exploit the vulnerability for carrying out a denial-of-service (DoS) attack,…
Robinhood attack exposes millions of customers’ details
Robinhood, the popular investment & trading platform, was recently hacked and fell prey to an extortion attempt. The extorter used their unauthorized access to…