Balaji

Google Chrome Bug Lets Sites Write to Clipboard Without Asking

There was an unintended bug introduced in version 104 of Google Chrome. It has been found in the bug that…

3 years ago

Chinese Hackers ScanBox Framework To Deploy Malware on Selected Targets

In the South China Sea, Chinese threat actors have targeted wind turbine fleets and Australian government agencies as a means…

3 years ago

Hackers Attack Hotel & Travel Organizations to Steal Sensitive Data

Hackers classified as TA558 have been increasing their activities since the beginning of this year. There has been an increase…

3 years ago

Russian APT Group Attack Microsoft 365 users Abusing Azure Services

There has been a surge in cyberespionage attacks levied by Cozy Bear (aka APT29 and Nobelium), a Russian cyberespionage group…

3 years ago

Largest Layer 7 DDOS Attack Recorded By Google with 46 Million Requests Per Second

Google has been targeted with the largest DDoS attack in history against one of its customers. An attack on one…

3 years ago

Warning!! New Chrome 0-Day Bug Being Exploited In The Wild

Google Chrome released a new security update for Windows, Linux & Mac users and an update for a new high…

3 years ago

Researchers Hacked SpaceX Operated Starlink Satellite Using $25 Modchip

In a hacking attempt carried out by a security researcher, Lennert Wouters, at the Belgian university KU Leuven, the Starlink…

3 years ago

What is Software Development Life Cycle, and what are the challenges at each stage of the SDLC?

The SDLC (Software Development Life Cycle is a framework) describes the various steps in software development. It covers the planning…

3 years ago

Conti Ransomware Operators Using ‘BazarCall’ Style Attack as an Initial Vector

In the context of phishing attacks, a BazarCall style attack is a form of targeted phishing that uses a call-back…

3 years ago

Top 7 Best Endpoint Detection & Response Products With Sandboxing Solutions – 2022

Endpoint detection and response (EDR) is a form of security solution that offers real-time visibility into anomalous endpoint behavior by…

3 years ago