Computer security

Germany student arrested for operating the Deutschland Dark Web

A 22 year old student from Germany has been arrested by the Federal Criminal Police(BKA) in Bavaria after suspicion that…

2 years ago

Medibank data breach and the story behind customers personal data accessed

Medibank, an Australian Insurance Company has confirmed that threat actors have accessed their customers personal data during a recent ransomware attack.

2 years ago

Zoho ManageEngine vulnerability used in the RCE attacks

The CISA has alerted the IT community for  a critical Java deserialization vulnerability affecting several Zoho ManageEngine solutions. The security flaw…

2 years ago

New Bumblebee malware has complete stealth and can deploy ransomware

Bumblebee malware is back again this time with a new version that is featuring a infection chain that uses the…

2 years ago

Top 5 Best VPN software for 2022

Organizations can choose from different VPN software available in the market, in this article we'll be discussing the top 5…

2 years ago

What is man-in-the-middle attack?

When an attacker interrupts communication between two different entities in an attempt to eavesdrop the conversation, alter the information that…

2 years ago

James Webb Telescope Image malware hidden and deployed by hackers

Security analysts have identified a new malware campaign 'GO#WEBBFUSCATOR' that works on malicious documents, phishing emails, and space images form…

2 years ago

DuckDuckGo Email Protection will now be available to everyone

DuckDuckGo has launched its 'Email Protection' service to everyone and people can start it with '@duck.com' email address.

2 years ago

Critical GitLab vulnerability allows hackers to perform remote code execution

GitLab is requesting users to update branches 15.1, 15.2 and 15.3 of community and enterprise editions to fix a critical…

2 years ago

SaaS platforms are targeted by hackers with 1100% rise in phishing attacks

Cybercriminals are continuously targeting SaaS solutions and platforms to create dubious websites and steal login credentials.

2 years ago