computer security

Cyberhaven Hacked – Chrome Extension With 400,000 users CompromisedCyberhaven Hacked – Chrome Extension With 400,000 users Compromised

Cyberhaven Hacked – Chrome Extension With 400,000 users Compromised

Cyberhaven, a prominent cybersecurity company, disclosed that its Chrome extension With 400,000+ users was targeted in a malicious cyberattack on…

3 months ago
Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data OnlineIndonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Indonesia Government Data Breach – Hackers Leaked 82 GB of Sensitive Data Online

Hackers have reportedly infiltrated and extracted a vast 82 GB of sensitive data from the Indonesian government's Regional Financial Management Information…

3 months ago
CISA Released Secure Mobile Communication Best Practices – 2025CISA Released Secure Mobile Communication Best Practices – 2025

CISA Released Secure Mobile Communication Best Practices – 2025

The Cybersecurity and Infrastructure Security Agency (CISA) has released new best practice guidance to safeguard mobile communications amid rising concerns…

3 months ago
ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft TeamsConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams

ConvoC2 – A Red Teamers Tool To Execute Commands on Hacked Hosts Via Microsoft Teams

A stealthy Command-and-Control (C2) infrastructure Red Team tool named ConvoC2 showcases how cyber attackers can exploit Microsoft Teams to execute…

4 months ago
Deloitte Denies Breach, Claims Only Single System AffectedDeloitte Denies Breach, Claims Only Single System Affected

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish the data it had stolen earlier…

4 months ago
Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator LightHackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light

Hackers Can Secretly Access ThinkPad Webcams by Disabling LED Indicator Light

In a presentation at the POC 2024 conference, cybersecurity expert Andrey Konovalov revealed a novel method for covertly disabling the…

4 months ago
Europol Dismantled Major Illegal IPTV Streaming Network ProvidersEuropol Dismantled Major Illegal IPTV Streaming Network Providers

Europol Dismantled Major Illegal IPTV Streaming Network Providers

In a major crackdown on illegal streaming, law enforcement authorities across Europe, supported by Europol and Eurojust, have successfully dismantled…

4 months ago
Firefox 133.0 Released with Multiple Security Updates – What’s New!Firefox 133.0 Released with Multiple Security Updates – What’s New!

Firefox 133.0 Released with Multiple Security Updates – What’s New!

Mozilla has officially launched Firefox 133.0, offering enhanced features, significant performance improvements, and critical security fixes. This latest release enhances…

4 months ago
Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code RemotelyVeritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content management solution. The vulnerability, rated…

4 months ago
Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi NetworksNearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as "GruesomeLarch" (also known as APT28, Fancy…

4 months ago