Cyber Attack
-
Posted: December 01, 2023Categories: Ransomware, Features, Cyber Attack, Data Breach, Cloud Security, Cloud malware, Cloud storage, DDoSViews: 48In the dynamic landscape of cybersecurity, the Cactus ransomware has adeptly navigated through significant vulnerabilities within the Qlik Sense data
-
In September, there was an unprecedented surge in ransomware activity, which came after a period of reduced activity in August,
-
Posted: October 21, 2023Views: 41ExelaStealer, a brand-new information thief, has joined an already crowded field of commercial malware meant to steal sensitive information from
-
Posted: September 27, 2023Views: 29Cybersecurity experts have identified a new cybercrime group called ShadowSyndicate, previously known as Infra Storm. This group has been active
-
Posted: September 11, 2023Views: 133Spyware masquerading as customized versions of Telegram has been detected on the Google Play Store. These apps have malicious functionalities
-
Posted: September 01, 2023Views: 1302The recent news of hackers using OTP APIs for SMS bombing and 44 Indian APIs being exposed is a matter
-
In our increasingly interconnected world, the rapid pace of technological advancement has brought unparalleled convenience and opportunity. However,
-
In the ever-expanding realm of cyber warfare, a shadowy player has emerged: “Mysterious Team Bangladesh.” This enigmatic group has been
-
Posted: July 18, 2023Views: 45Microsoft is looking into a persistent Exchange Online outage that prevents users from sending emails and results in 503 errors
-
Posted: July 07, 2023Categories: Ransomware, Security, Malware Alerts, Cyber Attack, Data Backup, Data Breach, vulnerability, HackerViews: 33With over 1.5 million installations combined, two malicious file management apps were identified by security experts on Google Play. These