NordVPN claimed that the usage of their services increased by 165% globally. Adversaries fake apps’ reviews to rank their apps so that they can get maximum downloads. It is indeed true that the world will not be the same place post-pandemic. A novel virus that has...
Google have recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs and had vulnerabilities allowing for MiTM attacks. SuperVPN Free VPN Client Bugs A couple of months ago, researchers...
We live in a digital age! From searching even the tiniest piece of information to ordering food and other services online; we’re totally dependent on technology. Living in a digital era also means that hackers have numerous opportunities to exploit government...
Twitter has recently disclosed a vulnerability that indirectly affected users’ privacy. As disclosed, this Twitter bug allowed a browser to store cached files, including the private ones. Twitter Bug Left Cached Files Stored Twitter has disclosed a bug impacting some...
Almost all of us have a general notion of which field we want to pursue our careers in. However, selecting the best course that can provide you with excellent job prospects is daunting. If you are on this page and reading this, it is obvious what you are looking for-...
Preparing for the CEH exam and need some helpful guidelines to do well? We’ve got you covered. In this blog, we will provide you with all the necessary information that will help you pass the exam with flying colours. With the importance of cyber security increasing...
While Apple has built a credible stance regarding users’ privacy, a bug has recently made shown otherwise. As discovered, an unpatched vulnerability existed in recent iOS versions that stopped VPNs from entire traffic encryption. Hence, it triggered the possibilities...
Security experts have reported two such sites where this software could be found. It comes with bot management features including restarting and shutting down an infected device, updating bot client, and more. Researchers have discovered sites that are exploiting the...
If you’ve read our previous blog, you may be aware of what social engineering penetration testing is. But if you haven’t, we advise that you give a quick read to that blog here. There are three main methods used to perform a social engineering attack including...
There was a big threat to shared private data, channels, and conversation leak from the Slack platform. Slack addressed a critical flaw within 24 hours from its disclosure. A bug bounty hunter discovered a critical vulnerability in Slack, the popular team...