Home - TC 1
It's tough to locate a VPN that you can rely on to keep your Android safe. On the Google Play Store, there are hundreds of bogus VPN apps that might infect your Android with malware. Furthermore, you cannot rely on most of them to safeguard you as they say. My...
Home - TC 2
There’s no argument for the statement that cryptocurrencies are growing at a pace, barely imagined before! This can even be accredited to consequences brought forward by the recent covid pandemic that has undoubtedly played a role in accelerating the growth of crypto prevalence.  As the first cryptocurrency introduced to the...
Home - TC 3
Seven youths between the ages of 16 and 21 have been arrested by the City of London Police for alleged ties to the prolific LAPSUS$ extortion gang, which has been linked to a recent wave of attacks against NVIDIA, Samsung, Ubisoft, LG, Microsoft, and Okta. "The City of London Police...
Home - TC 4
Scarab, a Chinese-speaking threat actor, has been linked to a bespoke backdoor known as HeaderTip as part of a campaign targeting Ukraine since Russia's incursion last month, making it the second China-based hacking outfit to profit from the war following Mustang Panda. In a report released this week, SentinelOne analyst...
Home - TC 5
Google released an out-of-band security update on Friday to fix a high-severity vulnerability in its Chrome browser that is being actively exploited in the wild, according to the company. The zero-day weakness, identified as CVE-2022-1096, is a type misunderstanding vulnerability in the V8 JavaScript engine. On March 23, 2022, an...
china hacker
  The Federal Communications Commission (FCC) of the United States added Kaspersky Lab, a Russian cybersecurity firm, to the "Covered List" of organizations that pose a "unacceptable risk to the country's national security" on Friday. This is the first time a Russian company has been included to the list, which has...
Home - TC 6
According to a new study, the virus known as DirtyMoe has obtained new worm-like propagation characteristics that allow it to spread its reach without any user engagement. In a paper published Wednesday, Avast researcher Martin Chlumeck wrote, "The worming module targets earlier well-known vulnerabilities, such as EternalBlue and Hot Potato...
Home - TC 7
The developer of the popular "node-ipc" NPM package published a new modified version to denounce Russia's invasion of Ukraine, sparking concerns about open-source and software supply chain security. The adjustments made by the library's maintainer RIAEvangelist, which affected versions 10.1.1 and 10.1.2, caused unwanted behavior by targeting users with IP...
ASUS FX504GE-ES72
Nearly a month after it was revealed that the malware used WatchGuard firewall appliances as a stepping stone to obtain remote access to infiltrated networks, ASUS routers have been the target of a budding botnet known as Cyclops Blink. The botnet's "primary objective is to develop an infrastructure for additional...
Home - TC 8
A financially motivated threat actor has been seen deploying a previously unknown rootkit targeting Oracle Solaris systems with the purpose of compromising ATM switching networks and making illicit cash withdrawals using counterfeit cards at various banks. Mandiant, a threat intelligence and incident response organization, is tracking the cluster as UNC2891,...
Home - TC 9
Apple MacBooks aren’t cheap. For what it is worth, it surely has a massive asking price. As a price-conscious beginner, getting the right MacBook becomes super important.  At the end of the day, laptops are depreciating assets. So you need to be super clear about your needs and wants to...
Home - TC 10
The Russian government has set up its own TLS certificate authority (CA) to address website access challenges that have emerged as a result of western sanctions imposed in response to Russia's illegal military invasion of Ukraine. The Ministry of Digital Development is expected to provide a domestic solution to handle...
Home - TC 11
Multiple security flaws have been discovered in major package managers that, if exploited, might allow attackers to run arbitrary code and access sensitive data from vulnerable machines, such as source code and access tokens. It's worth mentioning, however, that the issues require the targeted developers to use one of the...
Home - TC 12
This list features list of best laptops for every popular use case. This list is made in collaboration with specific industry experts to answer the query in best way possible. Lecturer from Harvard, Computer Science Engineers from Google, Bosch, Nvidea, Accenture, Students from IIT, NIT and researches from various...
Home - TC 13
The war has been stretched for more than 10 days and trading in stocks as well as the goods market has been caught in the crossfire.  India imports large quantity of Tea and sunflower oil, so the war threatens the importers and their businesses. India imports almost 90% of sunflower...
Home - TC 14
If your goal is to increase learning efficiency and, as a result, increase productivity, all you really need is to choose the right learning management system for a corporate or a small business. This is the right strategy and competitive advantage. But let's start from the very beginning. What is...
Home - TC 15
The two technology companies announced Tuesday that Google has agreed to buy cybersecurity firm Mandiant for $5.4 billion in an all-cash deal. https://twitter.com/Mandiant/status/1501353577813577729?t=dAfp5VQHCYw9eOi6BDbw_w&s=19 After the acquisition is completed later this year, Mandiant is likely to be merged into Google Cloud, adding to the latter's growing portfolio of security products, which includes...
Home - TC 16
During Russia's invasion of Ukraine, a variety of threat actors, including Fancy Bear, Ghostwriter, and Mustang Panda, have undertaken phishing efforts against Ukraine, Poland, and other European entities. The nation-state group FancyBear (aka APT28) – which is ascribed to Russia's GRU military intelligence – utilized two Blogspot domains as a...
Home - TC 17
The attack on Ukraine has no wonder brought a tension into this world and not only Ukraine alone stands as a victim but also the innocent Russians who emerged as the victims of the sanctions imposed on Russia. One of the major sufferers is Russia's leading search engine, Yandex  is...
Home - TC 18
Malware attacks against charities and non-governmental organizations (NGOs) working in Ukraine are aimed at disrupting their operations and humanitarian efforts to help those affected by Russia's war. In a blog post published on Friday, Amazon did not name the organizations targeted in the attacks. "While harmful state actors are increasing their...
Home - TC 19
As the Russia-Ukraine war enters its eighth day, cyber criminals and hacktivist groups are increasingly embracing the Telegram chat service for their activities. "User volume rose a hundredfold daily on Telegram linked groups, reaching at 200,000 per group," according to a new study by Israeli cybersecurity firm CheckPoint Research. Anti-Russian cyber...
Home - TC 20
The United States' Cybersecurity and Infrastructure Security Agency (CISA) published 95 new security weaknesses to its Known Exploited Vulnerabilities Catalog this week, bringing the total number of actively exploited vulnerabilities to 478. In a March 3, 2022 alert, the agency stated, "These types of vulnerabilities are a common attack vector...
Home - TC 21
Imperva, a cybersecurity firm, announced on Friday that it had just mitigated a ransom distributed denial-of-service (DDoS) attack that peaked at 2.5 million requests per second and targeted an undisclosed website (RPS). "While ransom DDoS assaults are not new, they look to be changing and growing more fascinating with time...
Home - TC 22
Details concerning a now-patched high-severity vulnerability in the Linux kernel that could be exploited to escape a container and execute arbitrary instructions on the container host have surfaced. The flaw is due to a Linux kernel feature known as control groups, also known as cgroups version 1 (v1), which allows...
Home - TC 23
During the course of the current Gehlot government, Congress kept its MLAs, including those from Rajasthan and Maharashtra, in five-star hotels and resorts on multiple occasions. On March 10, the results of elections in five states will be announced. The rumour in Rajasthan's political circles is that if the Congress...