60K Downloads for now-removed apps that prey on victims in the US and Australia. To find their new victims, the owners of the banking…
social engineering
Samsung Admits Data Breach Exposed Personal Information of Some US Customers
Samsung, a South Korean conglomerate, announced on Friday that it had experienced a cybersecurity incident. in Samsung Data Breach, It resulted in unauthorized access…
A TikTok vulnerability could have allowed account hijackers to take control
Microsoft has released a detailed description of a now-resolved issue that was potentially dangerous for TikTok users. Microsoft classified the issue as a “high-severity…
A command injection vulnerability in GitHub Pages has earned a bug hunter $4,000
Social engineering techniques were used to trick developers into exposing repositories. Using the GitHub Pages build process, a security researcher discovered a way to…
A student loan breach has exposed 2.5 million records.
In a breach that could lead to further problems, 2.5 million people were affected. Over 2.5 million loanees have been notified by EdFinancial and…
Windows And UnRAR Weaknesses Are Being Actively Used In The Field, According To CISA
Based on the evidence of active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its list of…
Twilio Was Compromised By A Phishing Scheme That Targeted Online Businesses
The world’s largest provider of communications services, Twilio, has revealed that hackers were successful in obtaining employee login information to access client data. The…
Over 9 lakh phishing and OTP compromise instances were recorded in the past two years; Financial fraud has been experienced by 42% of Indians
Phishing is a type of cybercrime in which a target is contacted via email, phone call, or text message by a person posing as…
New Gmail Attack Ignores Passwords And 2FA To Read All Email
As previously said in a post over the weekend, two-step verification and strengthening your login credentials are among the greatest practices for Gmail security…
Most Replicated Software in Malware Attacks, According to VirusTotal
Threat actors are increasingly imitating trustworthy programmes like Skype, Adobe Reader, and VLC Player in order to take advantage of trust connections and raise…