Latest Cybersecurity News

New Shlayer Trojan infects millions of macOS devicesNew Shlayer Trojan infects millions of macOS devices

New Shlayer Trojan infects millions of macOS devices

Cyber criminals are always looking for interesting means to affect users and exploit their ignorance towards cybersecurity. MacOS is usually…

5 years ago
Hackers launch sophisticated corona malware campaigns to infect computersHackers launch sophisticated corona malware campaigns to infect computers

Hackers launch sophisticated corona malware campaigns to infect computers

Hackers have created many phishing campaigns that are being distributed in the name of Corona. The mailer campaign is attached…

5 years ago
‘Cacheout’ strikes Intel again- CPUs, VMs and Intel SGX affected‘Cacheout’ strikes Intel again- CPUs, VMs and Intel SGX affected

‘Cacheout’ strikes Intel again- CPUs, VMs and Intel SGX affected

Cacheout is a speculative execution vulnerability in the modern Intel processors that were developed before October 2018. Cacheout is considered…

5 years ago
System Center 2012 R2 Configuration Manager- Upgrade, Design, Features, System RequirementsSystem Center 2012 R2 Configuration Manager- Upgrade, Design, Features, System Requirements

System Center 2012 R2 Configuration Manager- Upgrade, Design, Features, System Requirements

System Center 2012 R2 Configuration Manager is now for its unified management for service provider, Windows Azure ecosystem and on-premises…

5 years ago
Three Indonesian hackers were arrested for Magecart attacks on e-commerce sites. Three Indonesian hackers were arrested for Magecart attacks on e-commerce sites. 

Three Indonesian hackers were arrested for Magecart attacks on e-commerce sites.

In a press release on Jan 24, 2020, Indonesian National Police and the Interpol together did mentioned that, they have…

5 years ago
The crimes of Aleksei Burkov and behind the screens of the stolen credit cardsThe crimes of Aleksei Burkov and behind the screens of the stolen credit cards

The crimes of Aleksei Burkov and behind the screens of the stolen credit cards

Burkov created two illegal websites, Cardplanet marketplace and Cybercrime forum. Cardplanet marketplace hosted the details of the stolen credit cards,…

5 years ago
Android Xiny malware can gain root access to your devicesAndroid Xiny malware can gain root access to your devices

Android Xiny malware can gain root access to your devices

Android Xiny is malware that enters the device, remove the preinstalled applications that controls the root privilege access, after removing…

5 years ago
Amazon founder’s iPhone is hacked using the Saudi Prince’s What’sApp accountAmazon founder’s iPhone is hacked using the Saudi Prince’s What’sApp account

Amazon founder’s iPhone is hacked using the Saudi Prince’s What’sApp account

Jeff Bezos, the founder of Amazon and the world's richest man's iPhone was hacked on May 2018. Bezos received a…

5 years ago
Chameleon attack can now manipulate your ‘likes’ on Facebook, Linkedin and TwitterChameleon attack can now manipulate your ‘likes’ on Facebook, Linkedin and Twitter

Chameleon attack can now manipulate your ‘likes’ on Facebook, Linkedin and Twitter

The link previews and redirected links in the OSN is taken advantage to alter the published content. This OSN based…

5 years ago
What is SCCM- Introduction, Capabilities and ArchitecturesWhat is SCCM- Introduction, Capabilities and Architectures

What is SCCM- Introduction, Capabilities and Architectures

System Centre Configuration Manager(SCCM) is a Microsoft Windows product that helps IT departments to manage computers from a centralized location.…

5 years ago