Home 2017-08-28T17:57:09+05:30

Cybercriminals Are Using Free EDR Trials to Disable Your Current EDR

A sophisticated attack technique has emerged in which cybercriminals exploit free trials of Endpoint Detection and Response (EDR) software to disable existing security protections on compromised systems. Known as BYOEDR [...]

By | August 1st, 2025|Cybersecurity, Malware|0 Comments

Apple Fixes Safari Security Flaw Also Targeted in Recent Chrome Zero-Day Exploit

On Tuesday, Apple rolled out security updates for its entire software lineup, addressing a vulnerability that Google identified as a zero-day exploit in Chrome earlier this month. The flaw, labeled [...]

New Choicejacking Attack Exploits Public Chargers to Steal Data from Phones

Choicejacking is a new USB attack that tricks phones into sharing data at public charging stations, bypassing security prompts in milliseconds. If you believed using a public phone charger was [...]

By | July 30th, 2025|Cybersecurity, Data Protection, Mobile Security|0 Comments

Hackers Compromise Toptal’s GitHub, Release 10 Malicious npm Packages With 5,000 Downloads

In the latest example of a software supply chain attack, unidentified threat actors breached Toptal's GitHub organization account and used the access to upload 10 malicious packages to the npm [...]

By | July 29th, 2025|Cyber threat, Data Breach, Github|0 Comments

A massive data breach on the Leak Zone Dark Web forum has resulted in the exposure of sensitive information, including the IP addresses and geographical locations of over 22 million users

A significant cybersecurity breach has compromised the privacy of users accessing one of the internet's most infamous illegal marketplaces. On Friday, July 18, cybersecurity firm UpGuard uncovered an unsecured Elasticsearch [...]

By | July 28th, 2025|Data Breach|1 Comment

Subscribe to our newsletter to receive security tips everday!