Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.
Cyber Security News
Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content management solution.The vulnerability, rated with a CVSS v3.1...
CVE/vulnerability
7-Zip RCE Vulnerability Let Attackers Execute Remote Code
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing attackers to execute arbitrary code remotely.The flaw, identified...
Cyber Security News
Massive Credit Card Leak, Database of 1,221,551 Cards Circulating on Dark Web
A massive data breach has sent shockwaves across the globe, as a database containing sensitive financial information for over 1.2 million credit cards has...
Cyber Attack
Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks
Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch" (also known as APT28, Fancy Bear, or Forest Blizzard),...
Cyber Crime
240+ Domains Used By PhaaS Platform ONNX Seized by Microsoft
Microsoft's Digital Crimes Unit (DCU) has disrupted a significant phishing-as-a-service (PhaaS) operation run by Egypt-based cybercriminal Abanoub Nady, known online as "MRxC0DER." Nady developed and...
Cyber Security News
Russian TAG-110 Hacked 60+ Users With HTML Loaded & Python Backdoor
The Russian threat group TAG-110, linked to BlueDelta (APT28), is actively targeting organizations in Central Asia, East Asia, and Europe by deploying custom malware,...
Cyber Attack
Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations
Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to India, Taiwan, and Japan, leveraging spear-phishing and exploiting vulnerabilities in...
Cyber Security News
Raspberry Robin Employs TOR Network For C2 Servers Communication
Raspberry Robin, a stealthy malware discovered in 2021, leverages advanced obfuscation techniques to evade detection and analysis by infiltrating systems primarily via USB drives,...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.