New Botnet Reuse the Mirai Framework to Perform DDoS Attack on Android Devices
Recently, the Chinese security firm Qihoo 360's networking security division Netlab has discovered a nascent malware campaign.
This campaign has been spotted co-opting the Android devices into a botnet along with the principal objective of...
Wireshark 3.3.0 Released – Updated Futures, New Protocol & Updated Capture File Support
Recently, Wireshark released a fix with the new version, Wireshark 3.3.0, along with new features, protocol and updated capture file support along with the fixes for the vulnerabilities that occur in the BACapp dissector...
Patching On Time, Thwarts Cybercrime – Security Patch Management Guide
"It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it," says Stephane Nappo, Global Head of Information Security for Société Générale International Banking Pole.
Although a cyber incident...
Leveraging SOC 2 compliance for Cloud (SAAS) services
In a digital world where we often witness high-profile attacks, and incidents of a data breach, considering the implementation of effective security controls, policies and framework is essential. Securing sensitive data is paramount as...
The “Florentine Banker” Cybercrime Gang Trick C Level Executives From 3 British Firms To...
A cybercrime gang is known as 'Florentine Banker,' steal more than 1.1M GBP by tricking the top-level executives of the 3 British firms following a complicated Business Email Compromise (BEC) attack.
Though, the attack retort...
Guarding your Stored and Traded Crypto Assets
Cryptocurrencies are digital currencies built upon a blockchain network that have real values measured against regular fiat currencies and can be used as regular money in storage, investments, and even payments. They mostly used...
Severe Security Vulnerabilities in the Samsung Phones Let Hackers to Launch Remote Attacks
Recently, the security researchers detected a new security vulnerability in the Samsung Phones Find My Mobile app, allow hackers to Perform remote attacks.
This security vulnerability is quite severe as it enables the threat actors...
Top 10 Best Server Monitoring Tools in 2025
The process of regularly observing and evaluating the functionality, accessibility, and general condition of computer servers within a network infrastructure is known as server monitoring.
It entails routinely observing numerous server metrics and characteristics to...
U.S Charges Two Iranian Hackers for Attacking Computer Systems in the United States, Europe...
Recently, the US authorities have charged two Iranian nationals for carrying out cyberattacks for personal financial gains and benefits of the government of Iran.
The accusation states that Hooman Heidarian and Mehdi Farhadi have been...
TrueFire Hack – Credit Cards and User Personal Information Exposed
TrueFire is one of the excellent guitar
tutoring websites, including 1 million users, where you will get a vast library
of over 900 courses and 40,000 video lessons. Well, on January 10, 2020,
TrueFire has allegedly undergone...