GBH
GBH
Bluetooth BIAS Attack

Critical Bluetooth BIAS Attack Let Hackers Access Billions of Devices

0
A new attack dubbed Bluetooth BIAS attack allows attackers to spoof the already paired device and to successfully authenticate without having the link key...
Telegram MTProxy

Telegram MTProxy Used to Launch DDoS Attack Against Cloud Service Provider Arvan – Peaks...

0
An Iranian based Cloud Infrastructure provider Arvan experienced a DDoS attack that peaks up to 5,000 Requests Per Second via Telegram MTProxy. The attack...

Serious Security flaw Employee’s Provident Fund organisation | EPFO

0
  Employee’s Provident Fund organisation a statutory body under ministry of labour and employement, an Universal Account Number (UAN) will be generated for each of the...
Hackers Exploit Microsoft Exchange Vulnerabilities To Drop Babuk Ransomware

Hackers Exploit Microsoft Exchange Vulnerabilities To Drop Babuk Ransomware

0
The Cisco security researchers informed recently that another threat actors organization is targeting the Microsoft Exchange Server vulnerabilities to disseminate the ransomware "Babuk", and...
Void Balaur

Void Balaur – Hacker-for-Hire Group Stealing Emails & Sensitive Data From More Than 3,500...

0
Cybersecurity researchers at TrendMicro security firm have recently administered a very comprehensive insight into a productive hacking group operating as Hacker-for-Hire has targeted nearly...
Chinese APT Hackers “Mustang Panda” Attack Public & Private Sectors Using Weaponized PDF and Word Documents

Chinese APT Hackers “Mustang Panda” Attack Public & Private Sectors Using Weaponized PDF and...

0
Researchers discovered an ongoing malware campaign that believed to be operating by a Chinese based threat group called "Mustang Panda" that targets public and...
sources to trace new vulnerabilities

Top 7 Vulnerability Database Sources to Trace New Vulnerabilities

0
Vulnerability defined as the weakness that allows the attacker to enter in and harm, it may be a flaw in design or misconfiguration. In...
Researchers Hacked SpaceX Operated Starlink Satellite Using  Modchip

Researchers Hacked SpaceX Operated Starlink Satellite Using $25 Modchip

0
In a hacking attempt carried out by a security researcher, Lennert Wouters, at the Belgian university KU Leuven, the Starlink satellite-based internet system operated...

Rising Threats in CyberSpace – Organizations Must be Prepared to Experience

0
Recently we have seen more increase in various threats and the ways of intruding the network and there were increase by APT...
Unpatched RCE Vulnerability in LibreOffice Let Hackers Take Complete Control Of Your Computer

Unpatched RCE Vulnerability in LibreOffice Let Hackers Take Complete Control Of Your Computer

0
The researcher discovered a code execution vulnerability in LibreOffice let an attacker hack your computer by just sending a weaponized document with macro and...

Penetration Testing as a Service

Website

Complete Free Website Security Check

Website

Recent Posts