Balaji

Google Announced Game-changing Passwordless Authentication “Passkeys”

In accordance with World Password Day, Google has launched its new feature called “passkeys” which will provide a passwordless authentication…

2 years ago

Authorities Dismantled the Card-Checking Platform Try2Check

As per reports, the U.S government authorities have dismantled yet another large network of cybercriminals. Denis Gennadievich Kulkov, the prime…

2 years ago

FBI Seizes 9 Virtual Currency Exchange Services to Block Ransom Payments

The FBI has reportedly shut down 9 Virtual Currency Exchange services belonging to organizations to prevent cyber criminals from laundering…

2 years ago

AresLoader Malware Attacking Citrix Users Through Malicious GitLab Repo

Cyble Research and Intelligence Labs (CRIL) has recently detected AresLoader, a novel loader that is found to be disseminating numerous…

2 years ago

Critical VMware Vulnerabilities Let Attackers Execute Arbitrary Code

VMware Workstation, Workstation Pro, and Fusion have been subjected to several privately reported and fixed flaws. VMware has published a…

2 years ago

What is Single Sign-on (SSO) ? – Solution to Ensure Your Company Data Security

Single Sign-on is an authentication process that helps to log in to multiple applications using single login credentials. Security is…

2 years ago

ChatGPT Can be Tricked To Write Malware When You Act as a Developer Mode

Japanese cybersecurity experts warn that ChatGPT can be deceived by users who input a prompt to mimic developer mode, leading…

2 years ago

ICICI Bank Data Leak – Millions of Customers’ Sensitive Data Exposed

Researchers have recently found that the ICICI Bank systems misconfiguration caused data leakage, exposing more than 3.6 million customers' sensitive…

2 years ago

Operation DreamJob – New Linux Malware Linked With 3CX Supply-Chain Attack

ESET researchers have recently discovered that Linux users targeted with malware in the new "Operation DreamJob" Lazarus campaign for the…

2 years ago

Russian APT28 Group Exploiting Vulnerabilities in Cisco Routers

A recent report from CISA (US Cybersecurity and Infrastructure Security Agency)  revealed that the APT 28 group was responsible for…

2 years ago