Blog
Ethical Hacking- Enter into the World of Mystery Codes and Security Risks
When we hear the word hacking, we picture a person busy operating in a dark room, working on big machines surrounded by bully racks and blinking lights....
There have been 14 new web browser exploits discovered.
Personal data can be accessed on the internet via so-called XS-Leaks. A large number of browsers are affected. Cross-site leaks, or XS-Leaks, are 14 new...
Pegasus Spyware is said to have hacked the iPhones of US State Department officials and diplomats.
According to various reports from Reuters and The Washington Post, Apple warned many U.S. Embassy and State Department employees that their iPhones may...
What Will the Cyber-Security Threat Landscape Look Like in 2022?
Did you know worldwide cyber-security spending will be close to $133.7 billion by 2022? This prediction by Gartner Inc. is a response to growing...
An ongoing hack has been launched against IKEA’s email systems.
IKEA is fighting a hack in which threat actors are utilising stolen reply-chain emails to target employees in internal phishing assaults. Threat actors...
Want to Pursue a Career in Cyber Security in 2022? Four Things You Must Know!
With the increased focus on ransomware attacks and cyber-physical systems, more businesses are giving priority to risk leaders and security. After the...
Lookout Discovers a Global Campaign: Rooting Malware Makes a Comeback
The Lookout Threat Lab has discovered a new rooting malware that is available on Google Play as well as popular third-party stores like the Amazon...
CVE-2021-22205: GitLab Unauthenticated Remote Code Execution in the Wild
GitLab released a security update on April 14, 2021, to address CVE-2021-22205, a severe remote code execution vulnerability in the web interface. GitLab...
Pink was a botnet that contended with the vendor for control of the infected devices’ large numbers.
The majority of the following essay was written in early 2020, while the vendor was attempting to recover a significant number of infected devices. We...