Blogs
-
Read more
The vulnerability exposes various devices and users who use bluetooth to transfer data.
Read moreSecurity researchers have reported a new data breach and have named it db8151dd breach.
The Reverse RDP attack means a client system vulnerable to a path traversal vulnerability could get compromised when remotely accessing a server over
Read moreZero-day threats are the attacks that exploit zero-day vulnerabilities unknown to the developers.
Read moreAround 24000 android users get impacted by the misconfiguration of Google Firebase.
Read moreThe Indian Computer Emergency Response Team (CERT-In) has issued a warning about a banking trojan called EventBot.
756 GB of data is in danger because of REvil ransomware, also known as Sodinokibi.
Recent rese
Read moreTwo of the most famous plugins of WordPress are found to have severe vulnerabilities.
Read moreWorld's largest web hosting and cloud infrastructure provider suffers a data breach.
Read moreHackers have claimed to breach Microsoft's GitHub account and steal 500 GB of data.
Read moreNPAV Labs has recently analysed fake emails having the subject as "Release Incoming Messages".
cPanel is a very popular web and email hosting configuration panel used by corporate for their official email ids.
Net Prot
Read moreThe malware is said to impact IoT devices and Linux servers to launch DDoS attacks.
Read moreRansomware infecting android devices steals credit card details.
Read morePhishing links for paying taxes are surfacing which promise luring refunds.
A new android malware is found to be targeting various users and stealing their data.
The malw
Read moreVarious malware campaigns are launched by hackers using genuine email signatures.
Read morePhishing emails and scams are increasingly targeting individuals and organizations.
Back to Top