Wednesday, May 1, 2024

New Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History

0
Security Researcher discovered a vulnerability in macOS Mojave let malware apps bypass the privacy protection and read the safari browser web history.macOS Mojave...

“WhatsApp Will Never Be Secure” – Telegram Founder Attack Facebook Owned WhatsApp

0
"WhatsApp Will Never be Safe" !! Telegram Founder Pavel Durov Attack Facebook Owned WhatsApp after the recent incident, in which, WhatsApp fixed a high...

New BlackArch Penetration Testing Linux ISOs Released with More Hacking Tools

0
BlackArch Linux based Arch Linux. Lightweight Penetration Testing Distro designed for Professional & Elite Hackers who have the ability to work with Linux like...

4 Anti Drone Technologies That Can Neutralize Rogue Drones

0
civilians all over the globe. Go to any beautiful beach destination and you will find people flying drones in a bid to take amazing...

PassProtect – Google Chrome Plugin Tell You If your Password has Been Breached

0
A new free Chrome extension "PassProtect" to check in real-time whether you have been using already a breached password in the past.It quickly checks...

PuTTY 0.71 Released – SSH Client Updated To Fix a Large Number of Security...

0
The free and open-source SSH client updated with the fix for a number of Security Vulnerabilities including the one in RSA key exchange and...

OMG: Fake WhatsApp Android App Downloaded Over 1 Million People’s

0
Fake WhatsApp Android App called "Update WhatsApp"  has been Downloaded by 1 Million Peoples and trick users into downloading it thinking they were downloading...

New Black Hat Asia Research: More than 70% of Security Professionals Predict a Major...

0
Cyber attacks levels have raised concerning the IT security professionals across the globe, and Asia is not an exception to it. A majority of...

Hackers can use Power Lines to Steal Data from Air-Gapped Computer

0
Hackers can use AC power lines as a covert channel to extract data from air-gapped networks through a malicious code that controls power consumption...

7 New Meltdown and Spectre Level Vulnerabilities Discovered that Affected ARM, Intel & AMD...

0
A team of Researchers discovered 7 New Meltdown and Spectre Level attacks called a sound and extensible systematization of transient execution which includes 2...

Managed WAF protection

Website

Recent Articles