Trending Now
Cyber Security News
BlueNoroff: New Malware Attacking MacOS Users
Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT group and their ongoing RustBucket campaign. As a subgroup of Lazarus, BlueNoroff possesses...
Serpent Stealer Acquires Browser Passwords and Erases Intrusion Logs
Beneath the surface of the cyber realm, a silent menace emerges—crafted with the precision of the .NET framework, the Serpent Stealer slithers undetected through...
Doppelgänger: Hackers Employ AI to Launch Highly sophistication Attacks
It has been observed that threat actors are using AI technology to conduct illicit operations on social media platforms.These malicious actors employ several...
Kali Linux 2023.4 Released – What’s New!
Kali Linux 2023.4, the latest version of Offensive Security's renowned operating system, has been released, and it includes the advanced Gnome 45 desktop environment...
Trickbot Malware Developer Pleads Guilty & Faces 35 Years in Prison
A 40-year-old Russian national, Vladimir Dunaev, pleaded guilty for developing and deploying Trickbot malware. Trickbot, a suite of malware tools, targeted hospitals and businesses,...
ICANN Launches RDRS to Assist Law Enforcement Agencies to Discover Private Info
ICANN is a non-profit organization that is responsible for coordinating the global internet's-DNSIP address allocationThis organization manages the distribution and maintenance of domain names...
Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry
An American aerospace company has been the target of a commercial cyberespionage campaign dubbed AeroBlade, which appears to be aimed at carrying out both...
Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns
The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own cloud vulnerabilities in their catalog.CVE-2023-6345 CVE-2023-49103 As the national coordinator for critical...
Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability
A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense for initial access.Qlik Sense is a data discovery and analytics...
Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware
The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in underground communities.Threat actors use...
Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards
According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and their guests, through the...
Critical Zoom Vulnerability Let Attackers Take Over Meetings
Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially exploit for various malicious...
Hackers Using Weaponized Invoice to Deliver LUMMA Malware
Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. This tactic aims to deceive...
US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers
The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group Lazarus was using it to...
CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers
In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded in Water and Wastewater...
Top 10
Top 10 Best Free Data Recovery Software 2024
Free data recovery software or tools are one of the most essential tools that play a very important and key role in our lives,...
10 Best WiFi Hacking Apps for Android – 2024 Edition
In this article, we are sharing the top “Wi-Fi hacking Apps“ for Android applicants. With the help of this, anyone can hack the Wi-Fi...
Top 10 Best Free Antivirus Download For PC 2024
Basically, the Best Free Antivirus software is the most important part of Windows, and every Windows PC needs it now because online threats are...
New Top 10 Best Antivirus for Android – 100% Mobile Protection
Choosing the Best Antivirus for Android is the most important concern to protect your Android device from sophisticated cyber threats. An antivirus plays...
10 Best Linux Distributions In 2023
The Linux Distros is generally acknowledged as the third of the holy triplet of PC programs, along with Windows and macOS. Here we...
Top 10 Best Linux Distro Operating Systems For Ethical Hacking & Penetration Testing...
There are different OS for Hacking and Penetration Testing Linux distro is dedicatedly developed for Security Researchers or Ethical Hackers to perform various operations...
5 Best Security Measures for WordPress Security 2024
Not just for the purpose of your business, but also for the sake of the individuals who use your website, it is your responsibility...
10 Best App Locks and Privacy Locks for Android Devices in 2024
App Locks also known as privacy lock is one of the most important privacy concerns for all mobile users.Smartphones are very personal, and the...
7 Most Common Cyber Security Attacks in 2024
In our modern world, data is the most important asset for businesses. That’s why cybercriminals are generally after the data that companies hold.These...
Web Application Security: A 2023 Guide
Web application security refers to the measures taken to safeguard web applications from potential attacks.It involves strategies and processes to secure web applications...
5 Key Phases of Ethical Hacking
To succeed in the war against cybercrimes and hacking, companies and organizations have opted to think like hackers. Hackers will probe your systems to...
5 Best Adware Removal Tools to Block Annoying Ads in 2023
Adware Removal Tool is one of the most useful utilities used to block annoying ads on your favorite website and remove adware from your...