General Security News
-
Researchers Discover UEFI Bootkit Targeting Windows Computers Since 2012
Cybersecurity researchers on Tuesday revealed details of a previously undocumented UEFI (Unified Extensible Firmware Interface) bootkit that has...
-
WhatsApp, Instagram, Facebook & Messenger Down More than an Hour Globally – Back to Live Now!!
Social media and instant messenger giants Facebook, Instagram, WhatsApp, Messenger, facing global outages and users all around the globe...
-
Chinese Hackers Attack & Spy Windows Users Using Rootkits
GhostEmperor, a new Chinese cyber-espionage group, that is continuously attacking large organizations using Windows in Southeast Asia since at...
-
Ransomware Hackers Who Attacked Over 100 Companies Arrested in Ukraine
Law enforcement agencies have announced the arrest of two "prolific ransomware operators" in Ukraine who allegedly conducted a string of targeted...
-
Hackers Can Bypassed Apple Pay & Contactless limit to Make Large Visa Payments With Locked iPhones
iPhone users can utilize Apple Pay to pay contactless for their purchases, and users can do this by unlocking their device and drawing it closer...
-
Apple Pay Can be Abused to Make Contactless Payments From Locked iPhones
Cybersecurity researchers have disclosed an unpatched flaw in Apple Pay that attackers could abuse to make an unauthorized Visa payment with a...
-
Chinese Hackers Used a New Rootkit to Spy on Targeted Windows 10 Users
A formerly unknown Chinese-speaking threat actor has been linked to a long-standing evasive operation aimed at South East Asian targets as far back...
-
Here's a New Free Tool to Discover Unprotected Cloud Storage Instances
The IDC cloud security survey 2021 states that as many as 98% of companies were victims of a cloud data breach within the past 18 months. Fostered...
-
Top 10 Open Port Scanner and Port Checker Tools for 2021
Port scanner and port checker tools are one of the most essential parts to find the open ports and status of the port. The open ports mean a TCP...
-
Why Companies Should Start Taking Behavioural Analysis Seriously?
Behavioural analysis uses machine learning, artificial intelligence, big data, and analytics to recognize malicious behavior by examining...
-
BloodyStealer Malware Steals Cookies, Passwords, Bank Cards From Gamers Browser
It has been identified recently that the BloodyStealer is being traded on the dark web market. It is a Trojan that is generally used to steal...
-
Beware of Fake Amnesty International Antivirus for Pegasus that Hacks PCs with Malware
In yet another indicator of how hacking groups are quick to capitalize on world events and improvise their attack campaigns for maximum impact,...