Zhenhua Data, based in the south-eastern Chinese city of Shenzhen, compiled a database relying heavily on public open-source data. Unlike the Zhenhua...
ProLock ransomware is another version of PwndLocker which is active since March 2020.This ransomware attack had began their activity in late 2019(after...
CyberArk releases new SkyArk tool for scanning AWS and Azure infrastructure for misconfigured accounts. Cyber-security firm CyberArk has released a new free...
Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws. It comes with...
Another Alert Condition In Bluetooth Technology A new attack strategy, BLURtooth is used to grant unauthorized access by overwriting the authentication keys...
SASE – The secure access service edge (pronounced as “sassy”) is an emerging technology category of products and services that converge SD-WAN...
Zeus Game over is a peer-to-peer botnet based Trojan malware which is a part of the “Zeus” family of malware and viruses....
Clop Ransomware is a malware that encrypts your files and the encrypted key will be released until you pay ransom to the...
Nmap (Network Mapper) is one of the most simple and efficient tool that can be used for Penetration testing. It is an...
Penetration testing is a process used by organization to test their security scores of various software and IT infrastructures. This is basically...
Phishing Attacks Persist as Hackers Deploy Ingenious Strategies to Infiltrate User Inboxes
WHAT IS CYBER THREAT INTELLIGENCE?
Vulnerability in FIDO2 Protocol
WhatsApp OTP scam
Follina- New Zeroday RCE in Microsoft Office
Browser In The Browser (BITB) Attack makes phishing site difficult to detect
Pathfinder
A week in security (October 26 – November 1)
Brave (web browser)
Malware Analysis