Thursday, April 18, 2024

WhatsApp & Telegram Accounts Compromised By New Vulnerability that Allowed Hackers to Take over...

0
Checkpoint Researchers Compromised Both Whatsup & Telegram chat applications which served by End-to -End Encryption.Both application designed with strong encryption that won't allow to...

200 Unique Android Apps Discovered with Backdoor Called “MilkyDoor” Downloaded by Nearly 1...

0
An Android Backdoor called  MilkyDoor Infected with More than 200 Apps in Play store  which contains Nealy 1 million Downloads .According to the Trend...

Hackers Deliver Weaponized Notepad++ Via Google Ads

0
Cybercriminals are known to exploit malicious advertising techniques for targeting the widely-used Notepad++ text editor for Windows. This could lead to the dissemination of...

Hackers Increasing the use of “Command Line Evasion and Obfuscation” to Spread Advance...

0
Advance level threats are increasing day by day and attackers using more Sophisticated Techniques to bypass the Detection. Evasion and obfuscation technique give more...

A Malvertiser called “RoughTed” Bypass Ad-blocker and Get Half a Billion visits in 3...

0
A Malvertiser called "RoughTed" Successfully Bypass the Ad-Blockers and Delivery Malicious  Payloads into the visitors Operating Systems and Browsers which is used to visit...

Ask.com Toolbar Compromised Twice in 2 Months , Second Attack Installed RAT

0
Ask Partner Network (APN) has been compromised twice within 2 month since 2016 November. Researcher's Discovered deliver malware to computers running the Ask.com Toolbar.First...
Hackers Abuse Discord

Threat Actors Abuse Discord to Blend Within Organizations’ Network Traffic

0
Discord has become a household name in online gaming and digital communication. Gamers, friends, and families flock to this platform to chat, share, and collaborate....

North Korean Hackers Exploiting TeamCity Flaw to Compromise Organizations Network

0
Microsoft has detected two North Korean nation-state threat actors, Diamond Sleet and Onyx Sleet, exploiting CVE-2023-42793. This vulnerability allows remote code execution on various...

Octo Tempest Attacking Organizations to Steal Financial Data

0
Microsoft has been closely monitoring the Octo Tempest, a significant financial threat organization. This threat group employs various strategies and TTPs for worldwide extortion, making...

Tremendous Ad Fraud ‘Methbot’ : Attackers earn $3-5M Every day

0
What is Methbot Ad Fraud?Methbot was hosted and controlled by a hacker group in Russia and Operating out with data centres in US and Netherlands. It...

Managed WAF protection

Website

Recent Articles