Friday, March 29, 2024
Miori campaign

New Miori Malware Uses Text-based Protocol to Communicate with C&C Server for Launching a...

0
A new Mirai variant dubbed Miori uses text-based protocols to establish communication with command-and-control (C&C) servers.The Miori campaign was identified in last year...

Radio Tech Used to Hack Everything From Airplanes to Defibrillators

0
Earlier this year an experienced team of researchers at Northeastern University's Khoury College of Computer Sciences in Boston proved that an airliner's complex radio-navigation system can...
Tesla Autopilot source code

Ex-Tesla Employee Sued for Uploading an Autopilot Source Code to his iCloud and Shipped...

0
Former Tesla Employee Guangzhi Cao sued for illegally uploading the Tesla Autopilot source code into his personal iCloud Account in 2018 when he...
FinSpy

FinSpy Malware Attacking iOS and Android Devices to Steal Personal Information

0
A powerful surveillance malware dubbed FinSpy spies on various mobile platforms that includes iOS, Android devices, and desktop platforms. The FinSpy malware also known...
Buhtrap

Buhtrap Hackers Group Using Recently Patched Windows Zero-day Exploit to Attack Government Networks

0
An Infamous Cyberespionage group known as "Buhtrap" uses a Windows Zero-day exploit for its new campaign to attack businesses and perform targeted attack governmental institutions....
Zoom Web

Zoom Webcam Zero-Day Vulnerability Let Hackers Control 4+ Million Webcams Without Users Permission

0
A critical Zero-day vulnerability that affected Mac Zoom web client allows attackers to control nearly 4+ Million Webcams through the malicious website and enable...
Marriott International

Marriott International Facing More than $120 Million Fine Under GDPR for 2018 Data Breach

0
Marriott International fined over £99 million ($123 Millon) under the General Data Protection Regulation (GDPR) for failure to protect customer data.Information Commissioner's Office (ICO)...
IBM

IBM Announced that they Acquired Red Hat for $34 Billion

0
IBM announced that they have closes its acquisition of Red Hat for $34 billion. The acquisition combines the power and flexibility of Red Hat’s...

Multiple Critical Vulnerabilities Affected Huawei’s Web Application that Allows Hackers To Execute Code

0
Security researchers from Swascan discovered critical multiple vulnerabilities in Huawei web application that could be exploited by Cybercriminals to access sensitive information.Totally three vulnerabilities...
UK’s Biggest Forensic Services Provider Paid Huge Ransom After Their Systems Lock Down by Sophisticated Ransomware

UK’s Biggest Forensic Services Provider Paid Huge Ransom After Their Systems Lock Down by...

0
The UK based one of the most prominent forensic firm Eurofins Scientific suffering cyber attack with ransomware and, they paid to ransom to cybercriminals....

Managed WAF protection

Website

Recent Articles