Google Released Over 165 YARA Rules to Detect Cobalt Strike Components in Their Networks
There is a collection of IOCs from VirusTotal and YARA Rules that has been recently open-sourced by the Google Cloud Threat Intelligence team. As a...
Hackers Stealing Outlook and Thunderbird Credentials Using StrelaStealer Malware
StrelaStealer Malware
APT-36 Hackers Using New Hacking Tools & TTPs To Attack Indian Government Orgs
The cybersecurity analysts at Zscaler ThreatLabz have recently detected a new malicious version of a multi-factor-authentication (MFA) solution, known as Kavach, which has been...
OPERA1ER – An Advanced Threat Actor Group Stole At Least $11 Million From Banks...
The OPERA1ER threat group used off-the-shelf hacking tools to steal approximately $11 million from banks and telecommunications service providers throughout Africa.Over 35 successful cyberattacks...
Chrome 106 Released – Google Fixed 20 Security Bugs – Update Now!
The Chrome web browser was recently updated to a new stable version released by Google. Google Chrome's updated version Chrome 106 offers a number...
Critical Magento Vulnerability Let Unauthenticated Attackers to Execute Code
Sansec Threat Research Team noticed a surge in Magento 2 template attacks. This critical template vulnerability in Magento 2 tracked as (CVE-2022-24086) is increasing...
How to Spot Your Biggest Security Threat? Just Look out for the Humans
What is the biggest security threat in your company?As it turns out, it’s not some AI-powered machine learning super virus or pernicious and anonymous...
20 World’s Best Free Hacking Books For 2023
In today's article, we will discuss the best 20 Hacking Books, hence, if you want to learn hacking properly, and are a beginner, then...
Operating Systems Can be Detected Using Ping Command
Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, which used to find the Availability of a...
Fortifying Security Compliance Through a Zero Trust Approach
Hackers are seemingly constantly one step ahead of organizations' cyber security defenses by always picking out system and software vulnerabilities, as news headlines reveal...