Home 2017-08-28T17:57:09+05:30

Experts Uncover New CloudMensis Spyware Targeting Apple macOS Users

Cybersecurity researchers have taken the wraps off a earlier undocumented spyware focusing on the Apple macOS working technique. The malware, codename CloudMensis by Slovakian cybersecurity company ESET, is said to exclusively use [...]

By | July 20th, 2022|Security Advisory, Security Update, vulnerability|0 Comments

Russian Hackers Using DropBox and Google Drive to Drop Malicious Payloads

State-backed hackers part of Russia's Federation Foreign Intelligence Service (SVR) have started using Google Drive legitimate cloud storage service to evade detection. APT29, also tracked beneath the monikers Cozy Bear, [...]

By | July 20th, 2022|Security Advisory, Security Update, Tips|0 Comments

New Air-Gap Attack Uses SATA Cable as an Antenna to Transfer Radio Signals

Researchers , have published a paper that demonstrates how a hacker could extract data from an otherwise secure system via its SATA cable.   The attack uses the SATA cable itself [...]

Netwrix Auditor Bug Could Lead to Active Directory Domain Compromise

Netwrix IT asset tracker and compliance auditor, used across more than 11,500 organizations, contains a critical Insecure Object Deserialization vulnerability that could lead to Active Directory domain compromise. Netwrix The firm [...]

Subscribe to our newsletter to receive security tips everday!