Cyber Threat Intelligence Conclave On 31st May 2019

In today’s busy, high-tech world, most of us have a wide variety of our own personal information stored either online...


WhatsApp fixes a critical vulnerability that let attackers install spyware on phones

Whatsapp has recently patched a severe vulnerability that was being exploited by attackers to remotely install surveillance...


Microsoft released the source code of a new Windows Terminal Application

Microsoft released the source code of a new Windows Terminal application today featuring multi-tab support...


Parrot Security OS 4.6 Released with New Updates that bring all the hacking tools

Parrot 4.6 released by Parrot security with so many updates that bring all the hacking tools on the table with new futures...


Retefe Banking Malware Attack on Windows and Mac Users

The Retefe banking Trojan resurfaces in that threat landscape and implements new techniques to avoid detection...


Docker Hub Suffers a Data Breach, Asks Users to Reset Password

Docker Hub, one of the largest cloud-based library of Docker container images, has suffered a data breach after an unknown...


Several video game companies found to be infected with malware used in ShadowHammer

Several video game companies have been found to be infected with malware in a similar manner as was done with ASUS computers...


'Karkoff' Is the New 'DNSpionage' With Selective Targeting Strategy

The cybercriminal group behind the infamous DNSpionage malware campaign has been found running a new sophisticated...


Google: Expect longer Android app review process for unknown developers

After Google began restricting which Android apps can gain SMS and Call Log permissions, the company is now focusing on...


The Nasty List Phishing Scam is Sweeping Through Instagram

A new phishing scam called the "The Nasty List" is sweeping through Instagram and is targeting victim's login credentials...


Microsoft reveals hackers accessed some Outlook.com accounts for months

Microsoft has started notifying some Outlook.com users that a hacker was able to access accounts for months earlier this year...


Bug in the Skype Android app makes it automatically answer incoming calls

Android device owners are complaining about a bug in Skype that makes it automatically answer incoming calls....


WARNING: Scammers now trying to steal your details through Paypal

The Australian Cyber Security Centre (ACSC) is warning Aussies about malicious emails from scammers pretending...


UltraHack: The Security Risks of Medical Internet of Things (IoT)

IoT devices make our lives easier. Smart home technology, for example, can help users improve energy efficiency...


"Family Locator" Leaks Real-Time Location Data of App Users

A popular family tracking app, Family Locator, was found leaking the real-time locations of more than ...


LTE protocol Revealed That There Are 51 Security Flaws

In the latest research, A four-person research team from the Korean Advanced Institute of Science and Technology...


Microsoft Announces Windows Defender ATP Antivirus for Mac

Microsoft Thursday announced that the company is bringing its anti-malware software to Apple’s macOS operating system...


Android Q provides users more control over location data

Location is at the very core of smartphone experience for Android users. Be it searching a good eatery or a store...


Check Point Forensic Files: A New Monero CryptoMiner Campaign

A new variant of the Monero mining malware has been detected by the Sand Blast Agent Forensics team, which is spreading...


JNEC.a Ransomware Spread by WinRAR Ace Exploit

A new ransomware called JNEC.a spreads through an exploit for the recently reported code execution ACE vulnerability in WinRAR.


Microsoft Releases New updates a total of 64 CVE-listed security vulnerabilities

Microsoft released its March 2019 software updates to address a total of 64 CVE-listed security vulnerabilities...


LokiBot: An info-stealer malware targets Android systems

LokiBot is an info-stealer malware that was first detected in February 2016. LokiBot targets Android systems...


The thermal drone market is rapidly expanding everywhere

Unmanned aerial systems (UAS), more commonly known as drones, have infiltrated the geospatial world. And that’s a good thing...


New Google Chrome Zero-Day Vulnerability Found Actively Exploited in the Wild

You must update your Google Chrome immediately to the latest version of the web browsing application...


Bluesky 3D models improve Mobile, 5G and Smart City network planning

3D digital models derived from high-resolution aerial photography are helping network operators plan the rollout of services...


"Beyond the Grave" Phishing Campaign Targets Hedge Funds

The International hedge funds have become a victim of a new phishing campaign called "Beyond the Grave" that alter data...


New Golang Brute-Forcer Targeting E-Commerce Sites

A new malware has been spotted by security firm Malwarebytes, which is making rounds in the e-commerce space...


Decongesting cities trough optimum utilization of assets

During the last few decades, congestion has become a major challenge in Indian Cities. Not only in India but cities across the world face...


Smart Hack: Smart Home Hub Vulnerable to Remote Attacks Due To Weak Credentials

Smart devices, like security cameras, baby monitors, TV media boxes, smart TVs, printers, and gaming consoles,...


Formjacking: The Latest Evolving Scam

Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights...



Munchy Malware Distributed via DHL Phishing Campaign

A new trojan named Muncy, a phishing campaign from DHL and entitled “DHL Shipment Notification” has been found targeting users worldwide.



Kali Linux 2019.1 Released – Kernel 4.19.13, Metasploit 5.0 and Package Updates

Kali Linux 2019.1 released with a number of bug fixes and includes kernel up to...



New version of Separ malware infects hundreds of businesses through ‘Living Off the Land’

An ongoing phishing campaign is using a new variant of Separ malware to infect hundreds of businesses located mainly in Southeast Asia...



JD Finance stored user's screenshots without permission

JD Finance, a financial services arm of JD.com apologized to its users for storing screenshots without user permission after a user posted a video on...



Google implement new feature to stop sites from detecting Incognito Mode

Google Chrome's Incognito mode is a helpful feature for private browsing however, it is not free of any faults.



From 16 Famous Websites 620 Million Stolen User Data Hits The Dark Web

A new shocking report revealed that almost 620 million online account data from 16 famous websites are on sale on the dark web.