Cybersecurity
Android devices infected by 5 zero day vulnerabilities
Google’s Threat Analysis Group (TAG) found that threat actor used 5 zero-day vulnerabilities to install Predator spyware developed by Cytrox. ...
Emotet Malware again starts infecting users
What is Emotet Malware? Emotet is a malware that distributes through spam email campaigns with malicious attachments. If the user ...
Hackers breached T-Mobile’s systems and stole its source code
T-Mobile systems have been hacked by the Lapsus$ hacking group and stolen its source code in breaches that happened in ...
47 Chinese Apps banned in India and more apps under scrutiny
47 more Chinese apps banned in India by the IT Ministry as they are clones of apps or similar to ...
Twitter Hacked – Jeff Bezos, Bill Gates, Elon Musk and other corporate accounts targeted in the Twitter hack
Twitter released a note about a cyber attack in a tweet by Twitter Support. It said hackers accessed its internal ...
Critical SAP Bug allows hackers to take over Full Enterprise System
A critical bug in SAP carried a severity score 10 out of 10 on CvSS bug severity scale. SAP is ...
Chingari vulnerability may lead hijack any account
Indian tiktok clone app called Chingari has a serious security vulnerability which may lead to hijack any user account in ...
Google removed 11 apps from Play Store as it contains Joker malware
Google has removed 11 applications from Play store that have malware. The reason for Google’s decision is that these apps ...
Vulnerability in .NET Core can let attackers evade malware detection
A vulnerability in .Net Core library can let the attackers allowing malicious program by evading security software eyes. This vulnerability ...
Discord Client turned into a Password Stealer
Recently a threat actor turned Discord client into a password stealer by updated malware. A threat actor updated the AnarchyGrabber ...