Connecting the dots: Exposing the arsenal and methods of the Winnti Group

New ESET white paper released describing updates to the malware arsenal and campaigns of this group known for its supply-chain attacks Today, ESET Research releases a white paper updating our understanding...

9 Android Zero-day Vulnerabilities Affects Billions of Android Devices

Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller ID spoofing, unauthorized call operations, DOS attack, and...

LambdaGuard – AWS Lambda Serverless Security Scanner

LambdaGuard is a tool which allows you to visualise and audit the security of your serverless assets, an open-source AWS Lambda Serverless Security Scanner. AWS Lambda is an event-driven, serverless computing...

Oh there it is, Facebook shrugs as Free Basics private key found to be...

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: The Register Facebook has insisted that losing control of the private key used to sign its...

Connecting the dots: Exposing the arsenal and methods of the Winnti Group

New ESET white paper released describing updates to the malware arsenal and campaigns of this group known for its supply-chain attacks Today, ESET Research releases a white paper updating our understanding...

Ransomware Attack – Everything You Need to Know Ransomware

Ransomware attack is quite common nowadays since Malicious software spreading everywhere through various mediums. The cybercriminals that use it are looking to do one thing, extort your money. Not unlike...

LambdaGuard – AWS Lambda Serverless Security Scanner

LambdaGuard is a tool which allows you to visualise and audit the security of your serverless assets, an open-source AWS Lambda Serverless Security Scanner. AWS Lambda is an event-driven, serverless computing...

Oh there it is, Facebook shrugs as Free Basics private key found to be...

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: The Register Facebook has insisted that losing control of the private key used to sign its...

What is Non Compliance ? A Guide for Risk and Consequences

PCI DSS Non-Compliance impacting the business in various ways and leads to a variety of consequences. PCI DSS is a set of information security standards for corporations that help safeguard...

APLICATIONS

Mobile Malware Stealing data Such as Images, Text messages, Contacts

A newly emerging mobile malware GnatSpy capable of abusing infected mobile and stealing various type of data such Images, Text messages, Contacts, and...

HOT NEWS