Priya James

Ransomware Now Attacking MySQL Databases

Early this year, specialists cautioned of a spike in quantity of attacks against MongoDB frameworks, criminals asked for the payment…

8 years ago

CompTIA Cybersecurity Analyst+ overview – behavioral analytics

CompTIA Cybersecurity Analyst (CSA+) is a vendor-neutral cyber security certification that applies behavioral investigation to enhance the general condition of…

8 years ago

Fileless Memory-Based Malware Attacks Against 140 Banks, Enterprises Networks in 40 Countries

Researchers with Kaspersky Lab’s Global Research and Analysis Team Discovered the  Fileless Memory-Based Malware Attacks Against  More than 140 enterprises–primarily…

8 years ago

WordPress Team Secretly Fixed A Zero-Day Critical Content Injection Vulnerability

The WordPress security team revealed that they've secretly fixed a zero-day vulnerability in the WordPress CMS REST API.The vulnerability in…

8 years ago

Enhanced Security – Facebook supports USB security keys

None of us need strangers getting to our account on the web. You may use a password manager or two-factor…

8 years ago

Sophisticated Google Play Store Malware Affected over 10 Millions victims -Dont Download These Apps

New Android play Store Malware called HummingBad Download several million times by unsuspecting users and possible to gain all root…

8 years ago

Charger Ransomware that steals contacts and SMS messages from the user’s device – Energy Rescue

Mobile Security researchers from Checkpoint recognize a new ransomware called Charger embedded in app EnergyRescue. Like other malware found before, Charger checks the…

8 years ago

Black Hat Hacker CyberZeist (@cyberzeist2) Hacked FBI website “FBI.gov” and data leaked Online

The infamous dark cap hacker CyberZeist (@cyberzeist2) has broken into the FBI site FBI.gov and spilled information on Pastebin The…

8 years ago

DOS attack on Mac OS – Push fake alarms to Scare Users

One of the essential vectors for the delivery of technical support scams is malvertising. You'll basically be browsing the web…

8 years ago

Growth in Artificial intelligence Makes It Easy to Fake Images and Video

Growth in Artificial intelligence Makes It Easy to Fake Images, Audio, and Video, AI researchers have been successfully in creating 3D…

8 years ago