VALENTINES DAY GIFT BY SODINOKIBI RANSOMWARE HACKERS
Well known extortionist group Sodinokibi on 2020 Valentine, released data of the GEDIA automobile company in a well known forum. Since their last release of the data for the sameRead More →
Well known extortionist group Sodinokibi on 2020 Valentine, released data of the GEDIA automobile company in a well known forum. Since their last release of the data for the sameRead More →
Recently, Samsung vulnerability testing specialists announced that they would implement a number of modifications to Android kernel code, in an attempt to prevent some common attack variants against users ofRead More →
Although WhatsApp is the most widely used messaging application in the world, there are also millions of users of other services, mainly Telegram, considered a much more user-friendly option withRead More →
A few months ago a cybersecurity report revealed that at least 33 Canon cameras were exposed to the exploitation of some critical security vulnerabilities via WiFi or USB, which couldRead More →
Technology upgrade is most common factor to complete daily tasks in minimal time. Most up gradation is done to secure internal/ external networks. We usually find QR codes everywhere. FromRead More →
A couple of months ago, the EUtoday website published an ethical hacking report on the security of RSA certificates, mentioning that, while this is a secure algorithm (based on calculationRead More →
Cybercriminals not always have to use complex software tools or sophisticated fraud campaigns to trick victims, sometimes just a few data and sending some emails is enough. According to networkRead More →
Ransomware remains one of the most used attack variants by cybercriminals, and new ways of using encryption against victims are detected at every moment. Cybersecurity firm Emsisoft has reported theRead More →
Cases of vulnerability exploitation in Apple developments are really scarce, although reports on the finding of these flaws have become very common. One of the most recent reports was submittedRead More →
Cybersecurity professionals and firms agree when talking about the marked increase in cybercriminal activity over the last few years. Although metrics vary regarding this activity, one of the main indicatorsRead More →