Tuesday, February 25, 2025

Security News

Android Ecosystem Contains Several Hidden Patch Gaps that Can be Exploited by Hackers

The Android operating system is one of the most widely used platforms with 2 billion active users at the same time it facing a...

Over 65,000 Vulnerable Routers Abused by Multi-purpose Proxy Botnet

Attackers abuse the Universal Plug and Play (UPnP) protocol that comes with routers and uses the devices to create a powerful proxy network to...

52,000 Dangerous Command & Control Servers Take Down that Spreading Malware: It Performs 2M Malicious Redirects a Day

Around 52,000 Malicious Command & Control Severs has been taken down that continuously spreading Malware under well-documented infection chain called EITest.EITest is a Sophisticated...

Hackers can use Power Lines to Steal Data from Air-Gapped Computer

Hackers can use AC power lines as a covert channel to extract data from air-gapped networks through a malicious code that controls power consumption...

India’s Biggest Crypto Theft – Hackers Stolen Bitcoins Worth Rs 20 Crore From Exchange Firm

Hackers stole nearly 440 bitcoins that worth Rs 20 crore from the leading bitcoin exchange firm Coinsecure that has more than two lakh users...

Cloudflare Launches Spectrum to Protect Almost Entire Internet

Cloudflare introduces Spectrum to protect any services that connected to the Internet. Spectrum works in the same way as the Cloudflare and it extends Cloudflare...

17 Years Old Hacker Finds Critical Flaw in Signal App that Allows Anyone to Bypass Password & Screen lock in iOS

A 17 Years old Hacker who inspired by Edward Snowden discovered a critical vulnerability in Signal app that allows anyone to Bypass Authentication of...

Fake Android Apps that Impersonate as Security Applications Found in Play store with 6000,000 Installations

Newly discovered Fake Android Apps in Google play store that posed as offering security proving unwanted ads and other potential cyber threats to installed...