Balaji

Balaji

Android Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is EnabledAndroid Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is Enabled

Android Device Leaks Traffic When Connected to WiFi Network Even ‘Always-on VPN’ is Enabled

The installation of a VPN on your Android phone is supposed to ensure that all outgoing traffic is protected. This…

3 years ago
Fortinet Auth Bypass Bug Exploited in Wild for AttacksFortinet Auth Bypass Bug Exploited in Wild for Attacks

Fortinet Auth Bypass Bug Exploited in Wild for Attacks

A critical vulnerability has been identified recently in FortiGate firewalls and FortiProxy Web Proxy. While FortiGate has already alerted its…

3 years ago
Phishing-as-a-Service Platform Lets Anyone Launch Own Phishing CampaignsPhishing-as-a-Service Platform Lets Anyone Launch Own Phishing Campaigns

Phishing-as-a-Service Platform Lets Anyone Launch Own Phishing Campaigns

With the release of the PhaaS platform called 'Caffeine', threat actors can now easily launch their own sophisticated phishing attacks.…

3 years ago
Over 400 Malicious Android & iOS Apps Stealing Facebook PasswordsOver 400 Malicious Android & iOS Apps Stealing Facebook Passwords

Over 400 Malicious Android & iOS Apps Stealing Facebook Passwords

In a recent press release from Meta Platforms, it was announced that over 400 malicious apps had been identified on…

3 years ago
New Powerful RatMilad Malware Steals Almost Every Data From Android DeviceNew Powerful RatMilad Malware Steals Almost Every Data From Android Device

New Powerful RatMilad Malware Steals Almost Every Data From Android Device

A new Android spyware called RatMilad has been discovered by researchers at the security company Zimperium Labs. There have been…

3 years ago
Hackers Using a Custom Malware to Steal Sensitive Data From a U.S. OrganizationHackers Using a Custom Malware to Steal Sensitive Data From a U.S. Organization

Hackers Using a Custom Malware to Steal Sensitive Data From a U.S. Organization

An organization in the DIB sector was compromised by state-funded hackers using a custom malware program, CovalentStealer, and the Impacket…

3 years ago
WireShark 4.0.0 Released – What’s New!!WireShark 4.0.0 Released – What’s New!!

WireShark 4.0.0 Released – What’s New!!

There are several open-source packet analyzers available, but Wireshark is among the most popular. Moreover, the application has been upgraded…

3 years ago
Comm100 Live Chat App Hijacked in Supply Chain Attack to Deliver MalwareComm100 Live Chat App Hijacked in Supply Chain Attack to Deliver Malware

Comm100 Live Chat App Hijacked in Supply Chain Attack to Deliver Malware

As part of a new supply-chain attack being carried out against the Comm100 Live Chat application, the official installer for…

3 years ago
BlackCat Ransomware Gang Claims to Have Hacked US Department of Defense ContractorBlackCat Ransomware Gang Claims to Have Hacked US Department of Defense Contractor

BlackCat Ransomware Gang Claims to Have Hacked US Department of Defense Contractor

NJVC has been added to the victim list of the BlackCat (ALPHV) ransomware gang. NJVC provides IT support to the…

3 years ago
State-Sponsored Hackers Used MS Exchange 0-Day Bugs to Attack At least 10 OrgsState-Sponsored Hackers Used MS Exchange 0-Day Bugs to Attack At least 10 Orgs

State-Sponsored Hackers Used MS Exchange 0-Day Bugs to Attack At least 10 Orgs

In August 2022, hackers launched a limited wave of attacks that targeted at least 10 organizations around the world.  There…

3 years ago