fbpx
Home News

News

WannaCry: WannaCrypt Ransomware in Action

On Friday, 5th May 2017,  a variant of WannaCrypt Ransomware (WannaCry) started spreading across the globe. It targeted a vulnerability in the SMB protocol,...

Android Banking Trojan Found on Google Play Store

A security researcher has discovered a new deviation of the notorious Android banking Trojan hiding in apps under different names, such as Funny Videos...

Thousands of Hacked Routers Behind WordPress Attacks

A security firm “Wordfence” reported on Tuesday that tens of thousands of vulnerable home routers have been hacked and abused to launch attacks on...

Microsoft Office 0-day vulnerability Already Being Exploited

A Microsoft Office 0-day vulnerability that was disclosed just days ago is already being exploited by attackers associated with malware families such as Latentbot...

Facebook to Introduce More Ads on It’s Messenger

When Facebook hired David Marcus, the earlier president of PayPal, to run Facebook Messenger back in 2014, some understood the company would begin to...

Group of Hacker Demands Apple Pay Ransom for iCloud Credentials

Apple has received a ransom threat from a hacking group claiming to have access to data for up to 800 million iCloud accounts. The hackers,...

National Cyber Security Lab Worth of S$8.4m launched at NUS

A national laboratory that provides a practical environment for cyber security research and test-bedding of solutions against cyber threats was launched at the National...

Nmap 7.40 Holiday Edition

The Nmap Project has released the Holiday Edition of its open source, cross-platform security scanner and network mapper (holiday Nmap 7.40 release!), with several...

Trump’s National Security Pick to Support using of Offensive Cyber Weapons

For the post of National Security Adviser, the new president Donald Trump has plans to elect Michael Flynn, who believes that the government is...

12. Python For Hackers – Data Downloading Reverse HTTP Shell

Whats Inside : In this video we are going to create a reverse http shell that will download data . Github Project Files : https://goo.gl/FLENRY Help...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...