Evolution Of Multi-Factor Authentication

Multi-factor authentication (MFA) is a security process in which a user is granted access to a system or application only after successfully presenting two or more pieces of evidence to an authentication... Read more »

Myths about Cybersecurity

Cybersecurity is a complex and ever-evolving field. There are many myths and misconceptions about cybersecurity that can make it difficult for people to protect themselves from cyber threats. The most common myth... Read more »

Zulip Chat App Used For Covert C&C In Phishing Attacks By Russian Hackers

Russian threat actors are allegedly involved in a campaign that diplomatic targets the foreign affairs ministries of NATO member nations.   Duke Virus The virus known as Duke, which has been linked... Read more »

Chrome 116 Patches 26 Vulnerabilities

Google released Chrome 116 to the stable channel on August 16, 2023. The update includes patches for 26 vulnerabilities, including eight with a high severity rating. The most severe vulnerability is a... Read more »

Nearly 2,000 Citrix NetScaler instances were compromised due to a critical vulnerability.

In July 2023, a critical vulnerability (CVE-2023-3519) in Citrix NetScaler appliances was exploited by a threat actor to infect roughly 2,000 instances with a backdoor. The vulnerability was disclosed as a zero-day... Read more »
5 Brilliant Ways to Use Cyber Security Course

5 Brilliant Ways to Use Cyber Security Course

Cybersecurity is a rapidly growing field, and a cyber security course can provide you with the skills and knowledge to pursue a successful career in this field. With the increasing number of... Read more »
Cybersecurity Awareness

Cybersecurity Awareness: Protecting Yourself and Your Assets in the Digital Age

Cyber security is a growing concern in today’s world, where technology is becoming increasingly integrated into our daily lives. As a result, it is important for individuals and organizations to be knowledgeable... Read more »

#OpJerusalem 2019 Campaign spreading JCry Ransomware in now infecting Windows users

INTRODUCTION:  Since last 5 years around a new ransomware campaign infected server users around the world as part of the hashtag called #OpJerusalem campaign. It’s updated ransomware which is written in “Go”... Read more »

New Malware found using Google Drive: It is a command-and-control server

Since most security tools also keep an eye on the network traffic to detect malicious IP addresses, attackers are increasingly adopting infrastructure of legitimate services in their attacks to hide their malicious... Read more »

New Wireshark 3.0 version Released: With IP Map Feature

Introduction: Wireshark is the world’s foremost and widely used Network Protocol Analyzer by Ethical Hackers, Network Administrators, and Cyber Security Professionals. Wireshark is a very easy tool to handle, it sniffs all... Read more »