The havoc of Emotet malware is back and is upgrading itself using TrickBot

0
The Emotet malware is the most widely used malware in the cybercrime world. It is used in spam campaigns and attaches malicious files in the emails to make the devices vulnerable. Emotet...

Robinhood customer’s data is being sold on a hacking forum

0
The hacker who attempted the infamous Robinhood breach is now selling the data on a hacking forum. He allegedly is asking a hefty amount in exchange for data and has more...

Attack on StripChat stripped its user’s privacy

0
StripChat, one of the top five adult cam services on the internet, had a security breach, exposing the personal information of millions of users and adult models. StripChat exposed its ElasticSearch database...
Image Source: SecureReading

How well is the vulnerability exploit business booming?

0
Details on the parallel economy of vulnerability exploits on underground forums occasionally emerge from private talks, indicating just how deep certain threat actors' pockets are. Some adversaries claim to have multi-million dollar...

Microsoft notifies Azure AD users of a High-Severity Vulnerability

0
Customers were notified on Wednesday by Microsoft about a newly fixed information exposure issue in Azure Active Directory (AD). The vulnerability is identified as CVE-2021-42306 (CVSS score of 8.1) and is...

Facebook in it’s “new” is acting against cyber threats

0
Meta, the company that used to be known as Facebook, announced on Tuesday that it had taken action against four separate malicious cyber groups from Pakistan and Syria that had been...

Twitter has stopped opening AMP links on iOS and Android

0
According to a support page noticed by SEO consultant Christian Oliveira, Twitter has silently withdrawn support for Accelerated Mobile Pages (AMP) on mobile. The support page initially described how Twitter's mobile...

New variant of Joker spreading across the Play Store

0
A new batch of Joker malware variants has been identified spreading via the Play Store. These variations employ clever tactics to circumvent detection by Google's malware detection engine. The new variations were...

‘Face recognition’ software is being used by schools to collect lunch money from students

0
It has been found out that some schools in the UK are using the Face recognition feature to collect money from pupils for their meals. Although nine schools in total out...

What is CRM? A guide to analyzing if you need one!

0
What is CRM? CRM starts for Customer Relationship Management. It’s a system that allows you to reduce and optimize the work of your team.  In the olden day's businesses used excel to store...