Balaji

Record Breaking DDoS Attack – 158.2 Million Packets Per Second

When a DDoS attack is conducted, the server being targeted receives a large number of garbage requests. As a result,…

2 years ago

HiatusRAT Malware Attack Routers to Gain Remote Access & Download Files

Lumen's Black Lotus Labs recently witnessed that Hackers are currently targeting DrayTek Vigor router models 2960 and 3900 in a…

2 years ago

MQsTTang – Chinese Hackers Using Custom Malware To Evade AV Detection

In a recent analysis, MQsTTang, a newly designed custom backdoor, has been scrutinized by ESET researchers. After a thorough investigation,…

2 years ago

Underground Carding Marketplace BidenCash Leaked 2 Million Credit Cards

BidenCash, a new entrant in the underground carding business, has announced a 1-year anniversary promotion in which it is offering…

2 years ago

MyloBot Botnet Attacks Thousands of Windows Systems and Turns Them as Proxy

BitSight recently detected MyloBot, an advanced botnet that has successfully infiltrated numerous computer systems, primarily situated in four countries:-  India…

2 years ago

HardBit Ransomware Steal Sensitive Data From Victims Before Encrypting

As of October 2022, The HardBit ransomware attack was first detected as a threat extorting cryptocurrency payments to decrypt data…

2 years ago

75 Best Android Penetration Testing Tools – 2023

Android penetration testing tools are more often used by security industries to test the vulnerabilities in Android applications. Here you…

2 years ago

Does Online Privacy Actually Exist Anymore?

Data such as conversations, photos, finances, or other personal information can never be completely private in the digital age. It's…

2 years ago

Most Important Computer Forensics Tools for 2023

Computer Forensics tools are more often used by security industries to test the vulnerabilities in networks and applications by collecting…

2 years ago

Hackers Abuse Microsoft’s ‘Verified Publisher’ OAuth Apps to Hack Organizations Cloud

Multiple fraudulent Microsoft Partner Network accounts were discovered to have created harmful OAuth applications, causing breaches in organizations' cloud environments…

2 years ago