Cyber Security
Android devices infected by 5 zero day vulnerabilities
Google’s Threat Analysis Group (TAG) found that threat actor used 5 zero-day vulnerabilities to install Predator spyware developed by Cytrox. ...
Emotet Malware again starts infecting users
What is Emotet Malware? Emotet is a malware that distributes through spam email campaigns with malicious attachments. If the user ...
Hackers breached T-Mobile’s systems and stole its source code
T-Mobile systems have been hacked by the Lapsus$ hacking group and stolen its source code in breaches that happened in ...
A vulnerability in Alexa might have exposed your voice history to hackers
A vulnerability in Amazon Alexa might have exposed voice commands and install some skills (apps) in it. This vulnerability is ...
Twitter Hacked – Jeff Bezos, Bill Gates, Elon Musk and other corporate accounts targeted in the Twitter hack
Twitter released a note about a cyber attack in a tweet by Twitter Support. It said hackers accessed its internal ...
Critical SAP Bug allows hackers to take over Full Enterprise System
A critical bug in SAP carried a severity score 10 out of 10 on CvSS bug severity scale. SAP is ...
Chingari vulnerability may lead hijack any account
Indian tiktok clone app called Chingari has a serious security vulnerability which may lead to hijack any user account in ...
Google removed 11 apps from Play Store as it contains Joker malware
Google has removed 11 applications from Play store that have malware. The reason for Google’s decision is that these apps ...
Vulnerability in .NET Core can let attackers evade malware detection
A vulnerability in .Net Core library can let the attackers allowing malicious program by evading security software eyes. This vulnerability ...
Data Breach in BHIM payment app could lead to exposing 7 million users data
Data Breach in BHIM payment app could lead to exposing 7 million users data. Recently in a blog post by ...