The latest findings in Zoom’s screen sharing feature which can accidentally leak sensitive detail to other attendees in a call and it discloses the content of applications that are not shared...
Up to three MB of data can be hidden inside a Twitter image revealed, how Twitter hosts both MP3 audio files and ZIP archives present within the PNG images ...
Flaws have been detected in many WordPress plugins like Elementor, WP Super Cache which if abused could permit a hacker to execute a random code and take control of a website in some cases...
A group of threat actors who are originated in China is targeting telecom companies across the world so as to exfiltrate 5G technology secrets...
Graham Ivan Clark, the Teen hacker behind Twitter Bitcoin scam charged as an adult as he turned 18 in January 2021 and arrested after an operation was coordinated by the FBI...
The well-known SolarWinds campaign, hackers who compromised Mimecast networks, have also swiped some of Mimecast’s source code repositories ...
China Chopper, a web shell exploited by the state-sponsored Hafnium cybercriminals that originates from China
The threat actors make use of text messaging management services that are meant for business, to launch their attack that redirect SMS to reach the victim’s phone number to the systems that are controlled by them...
A new wave of ongoing cyberattacks that are abusing various vulnerabilities to deploy Mirai variants on compromised systems has been uncovered on Monday by cybersecurity researchers....
A data leak from stolen payment cards from compromised online stores is a new trick adopted by threat actors these days
Sign up to our Weekley Threat Digest and keep apace of the trends shaping Cybersecurity.