CxO

Most Difficult Security Challenges for CxO (Chief x Officers) During the Cyber Attack

New Technologies are evolving rapidly nowadays and cybercriminals also traveling, in the same way, to increase the cyber risk factor to the...
Hackers Bypass Symantec Web Gateways Using Mirai &  Hoaxcalls Botnets

Hackers Bypass Symantec Web Gateways Using Mirai & Hoaxcalls Botnets

A new Mirai and Hoaxcalls botnet campaign which is attacking post-authentication class of the Symantec Secure Web Gateway Remote code execution vulnerability.
Winnti APT Hacker Group

Winnti APT Hacker Group Attacks Video Gaming Companies Using PipeMon Malware

Winnti group has been active at least since 2012 and specializes in cyberattacks against the online video game industry. The main goal...
Fake Zoom Installers

Hackers Use Fake Zoom Installers to Install Backdoor and Devil Shadow Botnet on Windows...

Hackers taking advantage of the video conferencing apps like Zoom to infect systems with malicious routines. Security researchers from...
Best Ways to Detect and Handle Suspicious Email Attachments

Best Ways to Detect and Handle Suspicious Email Attachments

I'm going to share some tips on how to spot suspicious email attachments quickly and easily. We get so many emails daily...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security