New Botnet Reuse the Mirai Framework to Perform DDoS Attack on Android Devices

New Botnet Reuse the Mirai Framework to Perform DDoS Attack on Android Devices

Recently, the Chinese security firm Qihoo 360's networking security division Netlab has discovered a nascent malware campaign.  This campaign has been spotted co-opting the Android devices into a botnet along with the principal objective of...
Wireshark 3.3.0

Wireshark 3.3.0 Released – Updated Futures, New Protocol & Updated Capture File Support

Recently, Wireshark released a fix with the new version, Wireshark 3.3.0, along with new features, protocol and updated capture file support along with the fixes for the vulnerabilities that occur in the BACapp dissector...
Patch Management

Patching On Time, Thwarts Cybercrime – Security Patch Management Guide

"It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it," says Stephane Nappo, Global Head of Information Security for Société Générale International Banking Pole. Although a cyber incident...
Leveraging SOC 2 compliance for Cloud (SAAS) services

Leveraging SOC 2 compliance for Cloud (SAAS) services

In a digital world where we often witness high-profile attacks, and incidents of a data breach, considering the implementation of effective security controls, policies and framework is essential. Securing sensitive data is paramount as...
The “Florentine Banker” Cybercrime Gang Trick C Level Executives From 3 British Firms To Send Them £1.5 M

The “Florentine Banker” Cybercrime Gang Trick C Level Executives From 3 British Firms To...

A cybercrime gang is known as 'Florentine Banker,' steal more than 1.1M GBP by tricking the top-level executives of the 3 British firms following a complicated Business Email Compromise (BEC) attack.  Though, the attack retort...
Guarding your Stored and Traded Crypto Assets

Guarding your Stored and Traded Crypto Assets

Cryptocurrencies are digital currencies built upon a blockchain network that have real values measured against regular fiat currencies and can be used as regular money in storage, investments, and even payments. They mostly used...
Severe Security Vulnerabilities in the Samsung Phones Let Hackers to Launch Remote Attacks

Severe Security Vulnerabilities in the Samsung Phones Let Hackers to Launch Remote Attacks

Recently, the security researchers detected a new security vulnerability in the Samsung Phones Find My Mobile app, allow hackers to Perform remote attacks.  This security vulnerability is quite severe as it enables the threat actors...
Server Monitoring Tools

Top 10 Best Server Monitoring Tools in 2025

The process of regularly observing and evaluating the functionality, accessibility, and general condition of computer servers within a network infrastructure is known as server monitoring. It entails routinely observing numerous server metrics and characteristics to...
Iranian Hackers

U.S Charges Two Iranian Hackers for Attacking Computer Systems in the United States, Europe...

Recently, the US authorities have charged two Iranian nationals for carrying out cyberattacks for personal financial gains and benefits of the government of Iran. The accusation states that Hooman Heidarian and Mehdi Farhadi have been...
TrueFire

TrueFire Hack – Credit Cards and User Personal Information Exposed

TrueFire is one of the excellent guitar tutoring websites, including 1 million users, where you will get a vast library of over 900 courses and 40,000 video lessons. Well, on January 10, 2020, TrueFire has allegedly undergone...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...