Balaji

Balaji

Accenture Facing Lawsuit to Repay $32M+ for Failing to Deliver the Project On Time – Poorly Written Code For Security

Car rental Firm Hertz Corporation is suing to repay $32M and filed a Lawsuit against Accenture that failed to deliver…

2 years ago
New WhatsApp 0-Day Bug Let Hackers Execute a Code & Take Full App Control RemotelyNew WhatsApp 0-Day Bug Let Hackers Execute a Code & Take Full App Control Remotely

New WhatsApp 0-Day Bug Let Hackers Execute a Code & Take Full App Control Remotely

WhatsApp Bug. WhatsApp silently fixed two critical zero-day vulnerabilities that affect both Android & iOS versions allowing attackers to execute…

2 years ago
Hackers Hijack Home Routers & Change The DNS Settings to Implant Infostealer MalwareHackers Hijack Home Routers & Change The DNS Settings to Implant Infostealer Malware

Hackers Hijack Home Routers & Change The DNS Settings to Implant Infostealer Malware

Researchers discovered a new form of attack that targeted home routers and altered the DNS settings to redirect the victims…

2 years ago
What is a DNS Attack and How Does it Work?What is a DNS Attack and How Does it Work?

What is a DNS Attack and How Does it Work?

A DNS Attack is a type of cyber attack that exploits the weakness or vulnerability in a Domain name system.…

2 years ago
What is DNS Attack and How Does it Work?What is DNS Attack and How Does it Work?

What is DNS Attack and How Does it Work?

A DNS Attack is a type of cyber attack that exploits the weakness or vulnerability in a Domain name system.…

2 years ago
Most Important Cyber Attack Techniques often used by HackersMost Important Cyber Attack Techniques often used by Hackers

Most Important Cyber Attack Techniques often used by Hackers

Cyber attack occurs on a daily basis, and these can range from cyber attacks on tech giants to individuals falling…

2 years ago
Most Important Web Application Pentesting Tools & Resources – 2024Most Important Web Application Pentesting Tools & Resources – 2024

Most Important Web Application Pentesting Tools & Resources – 2024

Web Application Pentesting Tools are more often used by security industries to test the vulnerabilities of web-based applications. Here you…

2 years ago
Cyber Criminals Sharing GPT-4 API Keys for FreeCyber Criminals Sharing GPT-4 API Keys for Free

Cyber Criminals Sharing GPT-4 API Keys for Free

Recently, a script kiddie has been banned for sharing the stolen OpenAI API keys with many users on Discord for…

2 years ago
Over 60,000 Android Apps Silently Install Malware on DevicesOver 60,000 Android Apps Silently Install Malware on Devices

Over 60,000 Android Apps Silently Install Malware on Devices

Recently, cybersecurity researchers uncovered that over 60,000 Android applications had been stealthily disguised as genuine software for the past six…

2 years ago
Yuki Chan – Automated Penetration Testing and Auditing ToolYuki Chan – Automated Penetration Testing and Auditing Tool

Yuki Chan – Automated Penetration Testing and Auditing Tool

Yuki Chan is an Automated  Penetration Testing tool that will be auditing all standard security assessments for you. It is one…

2 years ago