In the ever-expanding realm of cyber warfare, a shadowy player has emerged: “Mysterious Team Bangladesh.” This enigmatic group has been
Continue readingCategory: Hacking
Hackers steal user data from Signal and WhatsApp with a bogus Android chat software
Hackers are infecting devices with spyware malware that harvests call logs, texts, and GPS positions from phones by utilizing the
Continue readingNew outage preventing emails on Microsoft Exchange Online
Microsoft is looking into a persistent Exchange Online outage that prevents users from sending emails and results in 503 errors
Continue readingA flaw in Microsoft Teams makes it possible for external accounts to distribute malware
Security researchers have discovered a straightforward method to introduce malware to a Microsoft Teams-using organization, despite the application’s limitations on
Continue readingAIIMS Delhi reports that a new cyberattack was stopped.
On Tuesday, a new cyberattack attempted to target the All India Institute of Medical Sciences in Delhi was stopped. The
Continue readingData security concern: Beware of scareware emails and know how to handle them.
In today’s digital age, it’s not uncommon to receive emails that claim to have detected threats to your security or
Continue readingBeware of Microsoft SharePoint Phishing: How to Spot and Stop Attacks on Your Business
Phishing is a cyber attack that uses fraudulent emails, websites, or messages to trick users into giving away sensitive information
Continue readingRansomware attack on Nagpur’s ammo maker – Solar Group
Imagine, the confidential information about rocket audits, engineering plans, and ammunition that are being produced or developed by a private
Continue readingCobalt Strike payload is being deployed by LockBit ransomware by exploiting Windows Defender
LockBit ransomware is exploiting windows defender to spread Cobalt Strike payload.
Continue readingSBI alerts users regarding usage of public mobile phone charging points
SBI has circulated an alert message regarding data theft which can be executed through public mobile charging points.
Continue reading