Hackers Mostly Targeting On WordPress Sites For Uploading The Files, XSS, and SQLi Bugs. Current report from Check Point that can ... Read more »
- Latest Post
More Headlines
Should You Use an Online Web Security Scanning Service or a Desktop Vulnerability Scanner?
Should You Use an Online Web Security Scanning Service or a Desktop Vulnerability Scanner? Chances are, you’re well aware of the fact tha... Read more »
CyberAttackers Are Targeting The Middle East Banks Through Malicious Excel Files
CyberAttackers Are Targeting The Middle East Banks Through Malicious Excel Files The FireEye which is a US security firm disclos... Read more »
Many Ubiquiti AirOS Routers Are On Under Worm Attack
Many Ubiquiti AirOS Routers Are On Under Worm Attack. According to an “urgent” warning posted by the company on a user forum tha... Read more »
The Operator Of Carding Site Extradited To Face US Criminal Charges On Selling Card Data
The Operator Of Carding Site Extradited To Face US Criminal Charges On Selling Card Data Djevair Ametovski, 29, of Macedonia, was ex... Read more »
Tumblr Gets Data Breach And Advice To Its User’s To Change New Password
Tumblr Gets Data Breach And Advice To Its User’s To Change New Password. At the starting of Thursday, Tumblr initiated without any... Read more »
Oops PornHub Hacked! Hacker Selling its Server Access For $1000
Oops PornHub Hacked! Hacker Selling its Server Access For $1000. Hacker claimed that he found command injection and shell access in... Read more »
New Malware Found In Swift Network, Based Banks Are On Risk
Alert! New Malware Found In Swift Network, Based Banks Are On Risk. The Society for Worldwide Interbank Financial Telecommunication... Read more »
The Vulnerability Of Blind XSS Permitted To Compromise of GoDaddy Support
The Vulnerability Of Blind XSS Permitted To Compromise of GoDaddy Support Approximately after four months revealing a blind cross-si... Read more »
Cyber Attackers Using ImageTragick Remote Code Execution Vulnerability To Process Crafted Images
Cyber Attackers Using ImageTragick Remote Code Execution Vulnerability To Process Crafted Images. Multiple Vulnerabilities Foun... Read more »
Finally Petya Ransomware Has Fixed And No Need To Pay Ransom
Finally Petya Ransomware Has Fixed And No Need To Pay Ransom. At the last month there is a new variety of ransomware exploded into t... Read more »
Attention: Locky Ransomware Is Still Hitting Schools, Hospitals and Companies
Beware: Locky Ransomware is still threatening Schools, Hospitals and Companies Yes, it is very sad to say that this ransomware is ... Read more »
Locky Ransomware: A New Danger Comes Up In The Cyber Era
Locky Ransomware: A New Danger Comes Up In The Cyber Era “Your Data could be inaccessible to you unless you pay”. Yes, you heard... Read more »
TeslaCrypt Ransomware Could Infect Your Hard Drives
TeslaCrypt Ransomware Could Infect Your Hard Drives A new Ransomware dubbed “Teslacrypt” had been exclusively for PC Game addicts. A... Read more »
TeslaCrypt 4.0: Knowing Your Enemy, Knowing Yourself
TeslaCrypt 4.0: Knowing Your Enemy, Knowing Yourself Ransomware is raging. It is extremely efficient as the victims often face an une... Read more »
Security Researcher Found ZeroAccess Malware Botnet To Launch Reflection DDoS Attacks
Security Researcher Found ZeroAccess Malware Botnet To Launch Reflection DDoS Attacks The ZeroAccess Malware's Botnet Can Be Abu... Read more »
Android Trojan Hides As A Video Player For Pornographic Movies
Android Trojan Hides As A Video Player For Pornographic Movies A security researchers observed that an Android trojan hides as a... Read more »