New Android Apps in the Play Store Contain Malware
In the recent, write up by Dr.Web on virus activity on mobile devices he mentioned that he has discovered...
July 28th, 2022
Continue ReadingIs Microsoft Teams down?
On July 21st on the official Microsoft twitter account for update on certain service incidents said that...
July 21st, 2022
Continue ReadingHarvest Credentials on Fraudulent Facebook Pages
Computer Emergency Response Team of Ukraine (CERT-UA) has released an article reporting that number of...
July 20th, 2022
Continue Reading$8.1 million stole in Uniwasp phishing attack
Uniswap a decentralized cryptocurrency exchange has loss millions of dollars in a phishing attack. On...
July 19th, 2022
Continue ReadingTwitter and YouTube Accounts of British Military Hacked by threat actors
On 4th July 2022, the Britain’s Ministry of Defense tweeted “The breach of the Army’s Twitter and...
July 14th, 2022
Continue ReadingThreat actors are still Exploiting Log4Shell vulnerability
Cybersecurity & Infrastructure Security Agency (CISA) and the United States Coast Guard Cyber Command...
July 7th, 2022
Continue ReadingU.S. FCC commissioner has requests google and Apple to take off TikTok from app stores
On 24th June 2022, Brendan Carr the Federal Communication Commission Commissioner has sent a letter to...
July 1st, 2022
Continue ReadingTop 25 Most Dangerous Software Weaknesses – 2022 CWE
On June 28th 2022, Mitre shared the 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software...
June 29th, 2022
Continue ReadingEmail bug lets attackers bypass Security
As notified by Cisco of the security flaw (tracked as CVE-2022-20798) was found in the external authentication...
June 16th, 2022
Continue ReadingSymbiote Malware infects all running processes on Linux Systems
A newly found malware known as Symbiote infects all running processes on compromised systems, steals...
June 10th, 2022
Continue ReadingRCE Vulnerability shambles Google Chrome Dev Channel
It has been reported that a recently patched severe remote code execution vulnerability flaw in the V8...
June 2nd, 2022
Continue ReadingZoom flaw enables users get hacked just by sending a Message
Our everyday video conferencing service Zoom was able to resolve as many as 4 security vulnerabilities,...
May 31st, 2022
Continue ReadingIf you interact, you get caught: A Chatbot phishing campaign
Phishing campaigns are usually executed on emails, whatever links included are commonly delivered through...
May 25th, 2022
Continue Reading21 Year old jailed for stealing Cryptocurrency by luring victims on Snapchat
Online crypto scams and fraudulent schemes are hardly anything new. However, this specific case of a...
May 16th, 2022
Continue ReadingLincoln College suffers Ransomware attack
Lincoln College is to shut down after 157 years due to ransomware attack? Lincoln College is situated...
May 11th, 2022
Continue ReadingWhatsApp is DOWN
According to many user reports, it seems that WhatsApp is experiencing outages. Reports state that the...
April 29th, 2022
Continue ReadingQuantum ransomware Strikes
The Quantum ransomware, 1st discovered in August of 2021 was seen spreading fast attacks that escalate...
April 26th, 2022
Continue ReadingPassword stealing malware for Sale
A new malware named BlackGuard is now available on Hacker forums! Now available for sale on numerous...
April 1st, 2022
Continue ReadingHonda Bug gives access to your Vehicles
Can hackers access your vehicle? Selected Honda and Acura car models have been affected with a recent...
March 28th, 2022
Continue ReadingA huge hit on OKTA
Many organizations that rely on Okta may have been collateral damage due to the big cyber hit on the...
March 25th, 2022
Continue ReadingCan anyone create a Fake Chrome Browser Windows?
A phishing kit and campaign has been released that allows red teamers and 'wannabe' cybercriminals to...
March 21st, 2022
Continue ReadingUbisoft states that a “security” incident resets Staff Passwords
Ubisoft, the well known video game developer confirms that they suffered a "cyber security incident"...
March 15th, 2022
Continue ReadingHow dangerous is Emotet?
Introduction Emotet is widely considered one of the world’s most dangerous global malware families...
March 10th, 2022
Continue ReadingSharkBot malware plays ‘hide and seek’ as an Android antivirus in Google Play Store
SharkBot banking malware has infiltrated the Google Play Store, the official Android app...
March 6th, 2022
Continue Reading‘Electron Bot’ infiltrates Microsoft Store via clones of Popular Games
Our Favorite Games are turning in to Malwares? As unfortunate as it sounds, a malware named Electron...
February 25th, 2022
Continue ReadingTikTok and YouTube shares ‘Your’ Data more than any other App, Take a look at how.
TikTok is sharing User Data more than other Social Media Platform, Study Claims. As we all know, one...
February 14th, 2022
Continue ReadingApps on your phone, They know a lot
Your mobile phone is accessing lot of data of yours? Are you safe? The average smartphone user these...
November 9th, 2021
Continue ReadingSecurity Operations Centre (SOC) Expectation Vs Reality
Security Operations Centre (SOC) is becoming a hot topic in the market and everyone expects to fight...
October 11th, 2021
Continue ReadingHow Did Facebook Disappear from the Internet?
On 4th October Facebook and its affiliated services WhatsApp and Instagram was reported to be missing...
October 7th, 2021
Continue ReadingHow being open can make you safer
Security by Obscurity is making you Vulnerable. Here's the loopholes of it and real-world examples of...
August 25th, 2021
Continue Reading5 key Considerations for Cyber Security Success
What is the key to Cyber Security Success. It's simple. Cyber security investments are becoming one...
August 25th, 2021
Continue ReadingHow to protect your personal data
If your data is stolen there's no point of it being secure. Insights to General Data Protection Regulation...
August 25th, 2021
Continue Reading3 Biggest Cybersecurity Lies
It's is time for business leaders to see cyberthreats for what they are—enterprise risk management...
August 25th, 2021
Continue Reading5 Key Points in selecting your Security Vendor
Technical and infrastructure readiness is important for all organisations in terms of Cyber. How can...
August 25th, 2021
Continue ReadingAre you Ready for General Data Protection Regulation (GDPR)?
It's the most advanced and people centric cyber security regulation released so far. Here's how your...
August 25th, 2021
Continue Reading3 Reasons why Cyber Security is Complex
A lot of organization try to apply find it complex to solve cybersecurity issues. Here's why. With...
August 25th, 2021
Continue ReadingThink Different, Add Quality
Creating an innovative product and maintaining quality of your products is an art. Learn how great brands...
August 25th, 2021
Continue ReadingSri Lankan Businesses: Next Generation of Technology Leaders Required
Solving problems is a fundamental use of technology. It's time organisations think of technology apart...
August 25th, 2021
Continue ReadingCyberLabs Implemented an Information Security Management System 100% Remotely in Australia
CyberLabs, the renowned cybersecurity solution provider, who is a member of SLASSCOM, successfully completed...
June 14th, 2021
Continue Reading