Most recent Aggah campaign steals cryptocurrency via hijacking clipboards

0
A new Aggah campaign that uses clipboard hijacking code to alter bitcoin addresses has been detected. Furthermore, this malware was discovered to be distributing...

Cisco’s glitch affects Firewalls

0
A newly identified vulnerability in two Cisco devices may allow remote access to be interrupted. Positive Technologies researcher Nikita Abramov discovered the issue –...

Israeli organizations getting constant hacking attacks from a new hacker group

0
Reportedly, a new hacker group has been targeting Israeli organizations at large and hacking the systems. The group, named Moses Staff has taken the...

Beware Joker malware is back!!

0
Joker malware has once again been found in the apps. According to analyst Tatyana Shishkova of security firm Kaspersky "Apps containing Joker malware have...

Prime Gaming will be giving away EA games throughout the next few months

0
For the next three months, Amazon and EA will be giving away free PC games and content through Amazon's Prime Gaming programme, so it...

Blacksmith Attack circumvents existing DDR4 memory defences

0
Researchers have discovered a novel Rowhammer approach that may allow for the circumvention of existing safeguards against Rowhammer exploits on DRAM memory. This new...

PNB client data was exposed for seven months due to vulnerability

0
According to cybersecurity company CyberX9, 180 million Punjab National Bank (PNB) clients' financial and personal information was at risk for almost seven months owing...

Alibaba Elastic Computing Service on the verge of getting hacked

0
Alibaba, a Chinese tech giant has a global presence, with cloud servers used in many parts of the world. Recently, Alibaba is facing some threats...

Nordpass has released a report on the most often used weak passwords in India

0
Passwords are used for everything from login to Facebook accounts to Gmail and Gpay. Our personal information is kept protected by using the password,...

Microsoft has published a report on the rise of Iranian cybercriminals

0
Over the past few years, Iranian hackers have adapted new tools, techniques, and processes to make their hacking more sophisticated. This has been disclosed...