Intruders

EU DPA bans Pegasus Software and similar Spyware tools

The European Union Data Protection Authority (DPA) called for a ban on the development and use of Pegasus like commercial…

3 years ago

Digital Services Act (DSA) and EU tech rules may be live by June 2022

European Union countries and lawmakers may reach an agreement by June on proposed techrules forcing online platforms to regulate their…

3 years ago

Spain arrest threat actors for SIM Swapping Attack

The Policia Nacional has arrested eight individuals last week after dismantling an anonymous cybercriminals organization for several SIM swapping attacks…

3 years ago

Hackers stole $322 million cryptocurrency from the Wormhole Cyberattack

The Wormhole Cyberattack incident happened earlier today and has affected Wormhole Portal, a web-based application called as Blockchain bridge, which…

3 years ago

Moses staff hacker group using new StrifeWater RAT for ransomware attacks

A hacker group called Moses Staff is incorporating an undocumented Remote Access Trojan (RAT) that disguises as a Windows Calculator…

3 years ago

SureMDM security vulnerabilities can lead to Supply Chain Attacks

Multiple security vulnerabilities have been disclosed in 42 Gears SureMDM solution. It is a mobile device management solution that can…

3 years ago

Graphic Card Fingerprinting is manipulated to track user’s activity on the web

A new fingerprinting technique is exploiting a device's graphics processing unit (GPU) that can track users activity on the web…

3 years ago

More than 20,000 data centers and ILO are exposed to threat actors

Security researchers at Cyble have identified more than 20,000 instances of data centers that are exposed publicly and could cause…

3 years ago

New initiative to secure US water-systems against Cyberattacks

The United States under Biden's command will initiate a new agenda to protect the country's water sector against cyberattacks, which…

3 years ago

What, Why and How of REvil Ransomware Attack

REvil ransomware is a malware that encrypts victims data and asks for a ransom just like any other ransomware. The…

3 years ago