Hacking and Security

Bluekeep Attacks Install Cryptocurrency Miners!

Windows Bluekeep Attacks Install Cryptocurrency Miners

Back in May this year, Windows had acknowledged the presence of the Bluekeep Bug, Now Attackers are using Bluekeep to install Cryptocurrency Miners. Bluekeep Attacks Install Cryptocurrency Miners! The renewed Bluekeep attacks were spotted by a...
Update Google Chrome Browser To Safeguard Your PC From Zero-day Exploits

Update Google Chrome Browser To Safeguard Your PC From Zero-day Exploits

Recently Google rolled out chrome update which had major changes but unfortunately, a few bugs lead Chrome Browser to zero-day vulnerabilities on Windows, Mac, and Linux. Hence, Google has rolled out a fix(build 78.0.3904.87)...
1.3 million Indian payment cards put up for sale on the Darkweb

1.3 million Indian payment cards put up for sale on the Darkweb

As security researchers have dubbed it as one of the most prominent cards dumps in history, 1.3 million Indian Payment cards are put up for sale on the Dark Web. 1.3 million Indian Payment cards...
Nord VPN

NordVPN Hack: A Follow Up on its Reason

After our article on the NordVPN Hack, officials from NordVPN reached out to us clarifying the reason for the hack. The Facts: What Actually Happened As per the email sent to us, the official states that, ...
Nord VPN HACKED!

NordVPN Hacked due to Expired Private Keys

Nord, a virtual private network provider has confirmed that it was hacked. After a tweet from Nord VPN invited the wrath of the infosec, it was discovered that they had breach which was finally...
Your Device Can Be Hacked By Sending A GIF On WhatsApp

Your Device Can Be Hacked By Sending A GIF On WhatsApp

Almost everyone who uses whatsapp must be using the GIF feature that adds weight to our dull and boring text messages. Although, you can also send stickers, but GIF has always been a first...

Spam Mail Contains Malicious URLs Instead of File Attachments

Proofpoint research for Q2 2019 suggests that 85% of Malicious Email Spam (MalSpam) contained a link to download a malicious file rather than any old school file attachment. Proofpoint also suggests that phishing has increased...
This Unpatchable Exploit "Checkm8" Can Jailbreak any iOS device

This Unpatchable Exploit “Checkm8” Can Jailbreak any iOS device

Checkm8 is an exploit that advantage of a flaw in Apple's BootROM which can allow Jailbreaking devices that are running iOS on A5 to A11 chipset. This flaw affects devices from Apple iPhone 4S...

STAY CONNECTED

1,479,593FansLike
21,732FollowersFollow
538FollowersFollow
95,112FollowersFollow
2,546FollowersFollow
1,566SubscribersSubscribe

POPULAR