Hackers classified as TA558 have been increasing their activities since the beginning of this year. There has been an increase…
There has been a surge in cyberespionage attacks levied by Cozy Bear (aka APT29 and Nobelium), a Russian cyberespionage group…
Google has been targeted with the largest DDoS attack in history against one of its customers. An attack on one…
Google Chrome released a new security update for Windows, Linux & Mac users and an update for a new high…
In a hacking attempt carried out by a security researcher, Lennert Wouters, at the Belgian university KU Leuven, the Starlink…
The SDLC (Software Development Life Cycle is a framework) describes the various steps in software development. It covers the planning…
In the context of phishing attacks, a BazarCall style attack is a form of targeted phishing that uses a call-back…
Endpoint detection and response (EDR) is a form of security solution that offers real-time visibility into anomalous endpoint behavior by…
Kali Linux 2022.3 was released recently, which contains new tools for hacking that were never before available. All the updates…
A surge in the number of Stegomalware instances using Steganography has been reported recently by the cybersecurity experts at Cyble…