Blog
Scammers are targeting Cash App users with fake ‘free-money’ giveaway campaigns
These scammers are using the same hashtags that are used by Cash App’s legitimate campaigns. When it comes to Cash App scams on YouTube, these scammers...
Stealthy Microsoft SQL Server Backdoor Malware Spotted in the Wild
Cybersecurity researchers claim to have discovered a previously undocumented backdoor specifically designed for Microsoft SQL servers that could allow a...
Multiple Security Flaws Found In Cisco Aironet Access Point Software
Cisco has recently released patches for numerous serious security vulnerabilities. The flaws existed in the Cisco Aironet Access Points Software, one of...
What is Cybersecurity Fingerprinting ?
Cybersecurity fingerprinting refers to a set of information that can be used to identify network protocols, operating systems, hardware devices, software...
Multiple Gaming And Photo Apps On Play Store Found to be Infected With Android Malware
Despite back-to-back reports of malicious apps, Google’s Play Store still harbors lots of such applications. Once again, researchers have discovered a...
EA Games Leaks Personal Data of 1600 FIFA 20 Competitors
EA Games has leaked the personal data of 1600 gamers who registered to take part in a competition via the company's website. Contenders signing up for the...
WhatsApp Is Planning To Introduce ‘Disappearing Messages’ Soon
According to recent reports, WhatsApp is seemingly working on a feature that might make it more trusted among the users. Specifically, they will soon...
New Instagram Phishing Attack Tricks Users With Fake Copyright Infringement Alerts
Instagram Phishing Attack Exploiting Copyright Alert Reportedly, researchers from Sophos have discovered a new phishing attack targeting Instagram users....
iOS 13 Bug Lets 3rd-Party Keyboards Gain ‘Full Access’ — Even When You Deny
Following the release of iOS 13 and iPadOS earlier this week, Apple has issued an advisory warning iPhone and iPad users of an unpatched security bug...