Balaji

Hackers Attack Hotel & Travel Organizations to Steal Sensitive Data

Hackers classified as TA558 have been increasing their activities since the beginning of this year. There has been an increase…

2 years ago

Russian APT Group Attack Microsoft 365 users Abusing Azure Services

There has been a surge in cyberespionage attacks levied by Cozy Bear (aka APT29 and Nobelium), a Russian cyberespionage group…

2 years ago

Largest Layer 7 DDOS Attack Recorded By Google with 46 Million Requests Per Second

Google has been targeted with the largest DDoS attack in history against one of its customers. An attack on one…

2 years ago

Warning!! New Chrome 0-Day Bug Being Exploited In The Wild

Google Chrome released a new security update for Windows, Linux & Mac users and an update for a new high…

2 years ago

Researchers Hacked SpaceX Operated Starlink Satellite Using $25 Modchip

In a hacking attempt carried out by a security researcher, Lennert Wouters, at the Belgian university KU Leuven, the Starlink…

2 years ago

What is Software Development Life Cycle, and what are the challenges at each stage of the SDLC?

The SDLC (Software Development Life Cycle is a framework) describes the various steps in software development. It covers the planning…

2 years ago

Conti Ransomware Operators Using ‘BazarCall’ Style Attack as an Initial Vector

In the context of phishing attacks, a BazarCall style attack is a form of targeted phishing that uses a call-back…

2 years ago

Top 7 Best Endpoint Detection & Response Products With Sandboxing Solutions – 2022

Endpoint detection and response (EDR) is a form of security solution that offers real-time visibility into anomalous endpoint behavior by…

2 years ago

Kali Linux 2022.3 Released – What’s New !

Kali Linux 2022.3 was released recently, which contains new tools for hacking that were never before available. All the updates…

2 years ago

Stegomalware Surge – Attackers Using File, Video, Image & Others To Hide Malware

A surge in the number of Stegomalware instances using Steganography has been reported recently by the cybersecurity experts at Cyble…

2 years ago