Balaji

Balaji

Used Routers Fully Loaded With Corporate Secrets for Just $100Used Routers Fully Loaded With Corporate Secrets for Just $100

Used Routers Fully Loaded With Corporate Secrets for Just $100

Researchers at ESET found that hardware on resale in the market consisted of highly confidential information such as IPsec or…

2 years ago
Hackers Storing Malware in Google Drive as Encrypted ZIP Files To Evade DetectionHackers Storing Malware in Google Drive as Encrypted ZIP Files To Evade Detection

Hackers Storing Malware in Google Drive as Encrypted ZIP Files To Evade Detection

Google released the threat horizon report for April 2023, which showed multiple methods used by threat actors for evading security…

2 years ago
What is Spear Phishing Attack? – Guide for Motives, Techniques & Prevention MethodsWhat is Spear Phishing Attack? – Guide for Motives, Techniques & Prevention Methods

What is Spear Phishing Attack? – Guide for Motives, Techniques & Prevention Methods

Every day tens of thousands of Spear phishing emails are sent to millions of victims around the world. Cyber-attacks have…

2 years ago
DoNot APT Hackers Attack Individuals Using Android Malware via Chatting AppsDoNot APT Hackers Attack Individuals Using Android Malware via Chatting Apps

DoNot APT Hackers Attack Individuals Using Android Malware via Chatting Apps

CYFIRMA recently detected a cyber-attack on a person living in Kashmir, India, and obtained two malware pieces from the victim's…

2 years ago
Western Digital Hack – Attackers Demanding “Minimum 8 Figures” as RansomWestern Digital Hack – Attackers Demanding “Minimum 8 Figures” as Ransom

Western Digital Hack – Attackers Demanding “Minimum 8 Figures” as Ransom

WD (Western Digital), the data storage solutions provider, recently announced a distressing announcement. In a cybersecurity incident, their network suffered…

2 years ago
Hackers Using Fake Google Chrome Error Screens To Inject MalwareHackers Using Fake Google Chrome Error Screens To Inject Malware

Hackers Using Fake Google Chrome Error Screens To Inject Malware

Researchers detect a new malware campaign that uses a web page with fake Google Chrome error screens, and the campaign…

2 years ago
Rorschach – Fastest Encryption Ransomware Ever Found in Ransomware HistoryRorschach – Fastest Encryption Ransomware Ever Found in Ransomware History

Rorschach – Fastest Encryption Ransomware Ever Found in Ransomware History

Researchers from Checkpoint found a new and previously unknown ransomware variant dubbed "Rorschach" with highly sophisticated features that target U.S.…

2 years ago
Grazie Ragazzi – But It’s Not Ferrari Who’s Saying It This Time!Grazie Ragazzi – But It’s Not Ferrari Who’s Saying It This Time!

Grazie Ragazzi – But It’s Not Ferrari Who’s Saying It This Time!

Ferrari's woes seem to be continuing from F1 tracks to their data. And surprisingly, ransomware today encrypts files as fast…

2 years ago
ChatGPT Ready to Write Ransomware But Failed to Go Deep ChatGPT Ready to Write Ransomware But Failed to Go Deep 

ChatGPT Ready to Write Ransomware But Failed to Go Deep

Our lives are now enriched by the availability of LLMs that are easily accessible on the internet, so we have…

2 years ago
Spyware Vendors Exploit 0-Days On Android and iOS DevicesSpyware Vendors Exploit 0-Days On Android and iOS Devices

Spyware Vendors Exploit 0-Days On Android and iOS Devices

The Threat Analysis Group (TAG) of Google unveiled recently that commercial spyware vendors targeted Android and iOS devices using zero-day…

2 years ago