Balaji

Balaji

The Fast-Growing Tech Startup’s Quick-Start Guide to ID VerificationThe Fast-Growing Tech Startup’s Quick-Start Guide to ID Verification

The Fast-Growing Tech Startup’s Quick-Start Guide to ID Verification

Identity verification probably wasn’t top of mind when you started your shiny new consumer tech startup. You were focused on…

1 year ago
Akira Ransomware Exploiting Zero-day Flaws For Organization Network AccessAkira Ransomware Exploiting Zero-day Flaws For Organization Network Access

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as a serious threat to data security.…

1 year ago
Trickbot Malware Developer Pleads Guilty & Faces 35 Years in PrisonTrickbot Malware Developer Pleads Guilty & Faces 35 Years in Prison

Trickbot Malware Developer Pleads Guilty & Faces 35 Years in Prison

A 40-year-old Russian national, Vladimir Dunaev, pleaded guilty for developing and deploying Trickbot malware. Trickbot, a suite of malware tools,…

1 year ago
A New Telekopye Bots That Tricks Users to Steal Payment DetailsA New Telekopye Bots That Tricks Users to Steal Payment Details

A New Telekopye Bots That Tricks Users to Steal Payment Details

Phishing bots are a tool used by hackers to fool people into disclosing private information such as- Login credentials Financial…

1 year ago
NukeSped Malware Exploiting Apache ActiveMQ VulnerabilityNukeSped Malware Exploiting Apache ActiveMQ Vulnerability

NukeSped Malware Exploiting Apache ActiveMQ Vulnerability

The Andariel threat group has been discovered installing malware via the exploitation of the Apache ActiveMQ remote code execution vulnerability…

1 year ago
MOVEit Hack : Over 185,000 AutoZone Users Personal Data HackedMOVEit Hack : Over 185,000 AutoZone Users Personal Data Hacked

MOVEit Hack : Over 185,000 AutoZone Users Personal Data Hacked

AutoZone Inc., a US retailer of automotive parts and accessories, warned customers that their data had been compromised as a…

1 year ago
Dell Command Configure Vulnerability Let Attackers Compromise Vulnerable SystemsDell Command Configure Vulnerability Let Attackers Compromise Vulnerable Systems

Dell Command Configure Vulnerability Let Attackers Compromise Vulnerable Systems

It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by…

1 year ago
Cisco Patched Products Vulnerable to HTTP/2 Rapid Reset AttackCisco Patched Products Vulnerable to HTTP/2 Rapid Reset Attack

Cisco Patched Products Vulnerable to HTTP/2 Rapid Reset Attack

A new high-severity vulnerability has been discovered in multiple Cisco products, which could potentially allow HTTP/2 Rapid Reset Attack. This…

1 year ago
Poloniex Offered $10 Million Reward to Hacker for Return of $120 MillionPoloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex Offered $10 Million Reward to Hacker for Return of $120 Million

Poloniex is a popular cryptocurrency exchange platform headquartered in the United States that provides a diverse range of digital assets…

1 year ago
New Phishing Attack Hijacks Email Thread to Inject Malicious URLNew Phishing Attack Hijacks Email Thread to Inject Malicious URL

New Phishing Attack Hijacks Email Thread to Inject Malicious URL

Researchers discovered a new campaign delivering DarkGate and PikaBot that employs strategies similar to those employed in QakBot phishing attempts.…

1 year ago