Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.
Cyber Security News
Washington State Filed Lawsuit Against T-Mobile Massive Data Breach
Washington State Attorney General Bob Ferguson filed a consumer protection lawsuit against T-Mobile for its alleged failure to secure sensitive personal information of over...
Cyber Security News
Stalwart – All-in-One Open-Source Secure Mail Server with JMAP, IMAP4, POP3, and SMTP
Stalwart is an innovative open-source mail server solution that supports JMAP, IMAP4, POP3, and SMTP, offering a comprehensive suite of features designed for security,...
cyber security
PriveShield – Advanced Privacy Protection with Browser Profile Isolation
A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on browsing history and user interaction, which disrupts cross-website tracking practices...
CVE/vulnerability
1000’s Of SonicWall Devices Remain Vulnerable To CVE-2024-40766
A recent investigation revealed that the Akira and Fog ransomware groups are actively exploiting the SonicWall NSA vulnerability (CVE-2024-40766) to compromise organizations. As of December...
Cyber Security News
Critical BIOS/UEFI Vulnerabilities Allow Attackers To Overwrite System Firmware
Researchers discovered critical BIOS/UEFI vulnerabilities in the Illumina iSeq 100 DNA sequencer, where the device utilizes an outdated firmware implementation with CSM mode lacking...
Cyber Security News
Silent Spies: How Russian Surveillance Systems Are Tracking You Worldwide
In an age where digital footprints can be traced with just a few clicks, surveillance technology has become a double-edged sword. While it can...
CVE/vulnerability
Oracle WebLogic Vulnerability Actively Exploited in Cyber Attacks – CISA
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the active exploitation of critical vulnerabilities in various software, particularly spotlighting an...
Cryptocurrency hack
PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner
Researchers observed a URL attempts to exploit a server-side vulnerability by executing multiple commands through PHP's system() function.It downloads a malicious executable from...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.