
Harvest Credentials on Fraudulent Facebook Pages
Computer Emergency Response Team of Ukraine (CERT-UA) has released an article reporting that number of...
July 20th, 2022
Continue Reading
$8.1 million stole in Uniwasp phishing attack
Uniswap a decentralized cryptocurrency exchange has loss millions of dollars in a phishing attack. On...
July 19th, 2022
Continue Reading
Twitter and YouTube Accounts of British Military Hacked by threat actors
On 4th July 2022, the Britain’s Ministry of Defense tweeted “The breach of the Army’s Twitter and...
July 14th, 2022
Continue Reading
Threat actors are still Exploiting Log4Shell vulnerability
Cybersecurity & Infrastructure Security Agency (CISA) and the United States Coast Guard Cyber Command...
July 7th, 2022
Continue Reading
U.S. FCC commissioner has requests google and Apple to take off TikTok from app stores
On 24th June 2022, Brendan Carr the Federal Communication Commission Commissioner has sent a letter to...
July 1st, 2022
Continue Reading
Top 25 Most Dangerous Software Weaknesses – 2022 CWE
On June 28th 2022, Mitre shared the 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software...
June 29th, 2022
Continue Reading
Email bug lets attackers bypass Security
As notified by Cisco of the security flaw (tracked as CVE-2022-20798) was found in the external authentication...
June 16th, 2022
Continue Reading
Symbiote Malware infects all running processes on Linux Systems
A newly found malware known as Symbiote infects all running processes on compromised systems, steals...
June 10th, 2022
Continue Reading
RCE Vulnerability shambles Google Chrome Dev Channel
It has been reported that a recently patched severe remote code execution vulnerability flaw in the V8...
June 2nd, 2022
Continue Reading
Zoom flaw enables users get hacked just by sending a Message
Our everyday video conferencing service Zoom was able to resolve as many as 4 security vulnerabilities,...
May 31st, 2022
Continue Reading
If you interact, you get caught: A Chatbot phishing campaign
Phishing campaigns are usually executed on emails, whatever links included are commonly delivered through...
May 25th, 2022
Continue Reading
21 Year old jailed for stealing Cryptocurrency by luring victims on Snapchat
Online crypto scams and fraudulent schemes are hardly anything new. However, this specific case of a...
May 16th, 2022
Continue Reading
Lincoln College suffers Ransomware attack
Lincoln College is to shut down after 157 years due to ransomware attack? Lincoln College is situated...
May 11th, 2022
Continue Reading
WhatsApp is DOWN
According to many user reports, it seems that WhatsApp is experiencing outages. Reports state that the...
April 29th, 2022
Continue Reading
Quantum ransomware Strikes
The Quantum ransomware, 1st discovered in August of 2021 was seen spreading fast attacks that escalate...
April 26th, 2022
Continue Reading
Password stealing malware for Sale
A new malware named BlackGuard is now available on Hacker forums! Now available for sale on numerous...
April 1st, 2022
Continue Reading
Honda Bug gives access to your Vehicles
Can hackers access your vehicle? Selected Honda and Acura car models have been affected with a recent...
March 28th, 2022
Continue Reading
A huge hit on OKTA
Many organizations that rely on Okta may have been collateral damage due to the big cyber hit on the...
March 25th, 2022
Continue Reading
Can anyone create a Fake Chrome Browser Windows?
A phishing kit and campaign has been released that allows red teamers and 'wannabe' cybercriminals to...
March 21st, 2022
Continue Reading
Ubisoft states that a “security” incident resets Staff Passwords
Ubisoft, the well known video game developer confirms that they suffered a "cyber security incident"...
March 15th, 2022
Continue Reading
How dangerous is Emotet?
Introduction Emotet is widely considered one of the world’s most dangerous global malware families...
March 10th, 2022
Continue Reading
SharkBot malware plays ‘hide and seek’ as an Android antivirus in Google Play Store
SharkBot banking malware has infiltrated the Google Play Store, the official Android app...
March 6th, 2022
Continue Reading
‘Electron Bot’ infiltrates Microsoft Store via clones of Popular Games
Our Favorite Games are turning in to Malwares? As unfortunate as it sounds, a malware named Electron...
February 25th, 2022
Continue Reading
TikTok and YouTube shares ‘Your’ Data more than any other App, Take a look at how.
TikTok is sharing User Data more than other Social Media Platform, Study Claims. As we all know, one...
February 14th, 2022
Continue Reading
Apps on your phone, They know a lot
Your mobile phone is accessing lot of data of yours? Are you safe? The average smartphone user these...
November 9th, 2021
Continue Reading
Security Operations Centre (SOC) Expectation Vs Reality
Security Operations Centre (SOC) is becoming a hot topic in the market and everyone expects to fight...
October 11th, 2021
Continue Reading
How Did Facebook Disappear from the Internet?
On 4th October Facebook and its affiliated services WhatsApp and Instagram was reported to be missing...
October 7th, 2021
Continue Reading
How being open can make you safer
Security by Obscurity is making you Vulnerable. Here's the loopholes of it and real-world examples of...
August 25th, 2021
Continue Reading
5 key Considerations for Cyber Security Success
What is the key to Cyber Security Success. It's simple. Cyber security investments are becoming one...
August 25th, 2021
Continue Reading
How to protect your personal data
If your data is stolen there's no point of it being secure. Insights to General Data Protection Regulation...
August 25th, 2021
Continue Reading
3 Biggest Cybersecurity Lies
It's is time for business leaders to see cyberthreats for what they are—enterprise risk management...
August 25th, 2021
Continue Reading
5 Key Points in selecting your Security Vendor
Technical and infrastructure readiness is important for all organisations in terms of Cyber. How can...
August 25th, 2021
Continue Reading
Are you Ready for General Data Protection Regulation (GDPR)?
It's the most advanced and people centric cyber security regulation released so far. Here's how your...
August 25th, 2021
Continue Reading
3 Reasons why Cyber Security is Complex
A lot of organization try to apply find it complex to solve cybersecurity issues. Here's why. With...
August 25th, 2021
Continue Reading
Think Different, Add Quality
Creating an innovative product and maintaining quality of your products is an art. Learn how great brands...
August 25th, 2021
Continue Reading
Sri Lankan Businesses: Next Generation of Technology Leaders Required
Solving problems is a fundamental use of technology. It's time organisations think of technology apart...
August 25th, 2021
Continue Reading
CyberLabs Implemented an Information Security Management System 100% Remotely in Australia
CyberLabs, the renowned cybersecurity solution provider, who is a member of SLASSCOM, successfully completed...
June 14th, 2021
Continue Reading