Harvest Credentials on Fraudulent Facebook Pages

Harvest Credentials on Fraudulent Facebook Pages

Computer Emergency Response Team of Ukraine (CERT-UA) has released an article reporting that number of...

July 20th, 2022

Continue Reading

$8.1 million stole in Uniwasp phishing attack

$8.1 million stole in Uniwasp phishing attack

Uniswap a decentralized cryptocurrency exchange has loss millions of dollars in a phishing attack. On...

July 19th, 2022

Continue Reading

Twitter and YouTube Accounts of British Military Hacked by threat actors

Twitter and YouTube Accounts of British Military Hacked by threat actors

On 4th July 2022, the Britain’s Ministry of Defense tweeted “The breach of the Army’s Twitter and...

July 14th, 2022

Continue Reading

Threat actors are still Exploiting Log4Shell vulnerability

Threat actors are still Exploiting Log4Shell vulnerability

Cybersecurity & Infrastructure Security Agency (CISA) and the United States Coast Guard Cyber Command...

July 7th, 2022

Continue Reading

U.S. FCC commissioner has requests google and Apple to take off TikTok from app stores

U.S. FCC commissioner has requests google and Apple to take off TikTok from app stores

On 24th June 2022, Brendan Carr the Federal Communication Commission Commissioner has sent a letter to...

July 1st, 2022

Continue Reading

Top 25 Most Dangerous Software Weaknesses – 2022 CWE

Top 25 Most Dangerous Software Weaknesses – 2022 CWE

On June 28th 2022, Mitre shared the 2022 Common Weakness Enumeration (CWE™) Top 25 Most Dangerous Software...

June 29th, 2022

Continue Reading

Email bug lets attackers bypass Security

Email bug lets attackers bypass Security

As notified by Cisco of the security flaw (tracked as CVE-2022-20798) was found in the external authentication...

June 16th, 2022

Continue Reading

Symbiote Malware infects all running processes on Linux Systems

Symbiote Malware infects all running processes on Linux Systems

A newly found malware known as Symbiote infects all running processes on compromised systems, steals...

June 10th, 2022

Continue Reading

RCE Vulnerability shambles Google Chrome Dev Channel

RCE Vulnerability shambles Google Chrome Dev Channel

It has been reported that a recently patched severe remote code execution vulnerability flaw in the V8...

June 2nd, 2022

Continue Reading

Zoom flaw enables users get hacked just by sending a Message

Zoom flaw enables users get hacked just by sending a Message

Our everyday video conferencing service Zoom was able to resolve as many as 4 security vulnerabilities,...

May 31st, 2022

Continue Reading

If you interact, you get caught: A Chatbot phishing campaign

If you interact, you get caught: A Chatbot phishing campaign

Phishing campaigns are usually executed on emails, whatever links included are commonly delivered through...

May 25th, 2022

Continue Reading

21 Year old jailed for stealing Cryptocurrency by luring victims on Snapchat

21 Year old jailed for stealing Cryptocurrency by luring victims on Snapchat

Online crypto scams and fraudulent schemes are hardly anything new. However, this specific case of a...

May 16th, 2022

Continue Reading

Lincoln College suffers Ransomware attack

Lincoln College suffers Ransomware attack

Lincoln College is to shut down after 157 years due to ransomware attack? Lincoln College is situated...

May 11th, 2022

Continue Reading

WhatsApp is DOWN

WhatsApp is DOWN

According to many user reports, it seems that WhatsApp is experiencing outages. Reports state that the...

April 29th, 2022

Continue Reading

Quantum ransomware Strikes

Quantum ransomware Strikes

The Quantum ransomware, 1st discovered in August of 2021 was seen spreading fast attacks that escalate...

April 26th, 2022

Continue Reading

Password stealing malware for Sale

Password stealing malware for Sale

A new malware named BlackGuard is now available on Hacker forums! Now available for sale on numerous...

April 1st, 2022

Continue Reading

Honda Bug gives access to your Vehicles

Honda Bug gives access to your Vehicles

Can hackers access your vehicle? Selected Honda and Acura car models have been affected with a recent...

March 28th, 2022

Continue Reading

A huge hit on OKTA

A huge hit on OKTA

Many organizations that rely on Okta may have been collateral damage due to the big cyber hit on the...

March 25th, 2022

Continue Reading

Can anyone create a Fake Chrome Browser Windows?

Can anyone create a Fake Chrome Browser Windows?

A phishing kit and campaign has been released that allows red teamers and 'wannabe' cybercriminals to...

March 21st, 2022

Continue Reading

Ubisoft states that a “security” incident resets Staff Passwords

Ubisoft states that a “security” incident resets Staff Passwords

Ubisoft, the well known video game developer confirms that they suffered a "cyber security incident"...

March 15th, 2022

Continue Reading

How dangerous is Emotet?

How dangerous is Emotet?

Introduction Emotet is widely considered one of the world’s most dangerous global malware families...

March 10th, 2022

Continue Reading

SharkBot malware plays ‘hide and seek’ as an Android antivirus in Google Play Store

SharkBot malware plays ‘hide and seek’ as an Android antivirus in Google Play Store

  SharkBot banking malware has infiltrated the Google Play Store, the official Android app...

March 6th, 2022

Continue Reading

‘Electron Bot’ infiltrates Microsoft Store via clones of Popular Games

‘Electron Bot’ infiltrates Microsoft Store via clones of Popular Games

Our Favorite Games are turning in to Malwares?  As unfortunate as it sounds, a malware named Electron...

February 25th, 2022

Continue Reading

TikTok and YouTube shares ‘Your’ Data more than any other App, Take a look at how.

TikTok and YouTube shares ‘Your’ Data more than any other App, Take a look at how.

TikTok is sharing User Data more than other Social Media Platform, Study Claims. As we all know, one...

February 14th, 2022

Continue Reading

Apps on your phone, They know a lot

Apps on your phone, They know a lot

Your mobile phone is accessing lot of data of yours? Are you safe? The average smartphone user these...

November 9th, 2021

Continue Reading

Security Operations Centre (SOC) Expectation Vs Reality

Security Operations Centre (SOC) Expectation Vs Reality

Security Operations Centre (SOC) is becoming a hot topic in the market and everyone expects to fight...

October 11th, 2021

Continue Reading

How Did Facebook Disappear from the Internet?

How Did Facebook Disappear from the Internet?

On 4th October Facebook and its affiliated services WhatsApp and Instagram was reported to be missing...

October 7th, 2021

Continue Reading

How being open can make you safer

How being open can make you safer

Security by Obscurity is making you Vulnerable. Here's the loopholes of it and real-world examples of...

August 25th, 2021

Continue Reading

5 key Considerations for Cyber Security Success

5 key Considerations for Cyber Security Success

What is the key to Cyber Security Success. It's simple. Cyber security investments are becoming one...

August 25th, 2021

Continue Reading

How to protect your personal data

How to protect your personal data

If your data is stolen there's no point of it being secure. Insights to General Data Protection Regulation...

August 25th, 2021

Continue Reading

3 Biggest Cybersecurity Lies

3 Biggest Cybersecurity Lies

It's is time for business leaders to see cyberthreats for what they are—enterprise risk management...

August 25th, 2021

Continue Reading

5 Key Points in selecting your Security Vendor

5 Key Points in selecting your Security Vendor

Technical and infrastructure readiness is important for all organisations in terms of Cyber. How can...

August 25th, 2021

Continue Reading

Are you Ready for General Data Protection Regulation (GDPR)?

Are you Ready for General Data Protection Regulation (GDPR)?

It's the most advanced and people centric cyber security regulation released so far. Here's how your...

August 25th, 2021

Continue Reading

3 Reasons why Cyber Security is Complex

3 Reasons why Cyber Security is Complex

A lot of organization try to apply find it complex to solve cybersecurity issues. Here's why. With...

August 25th, 2021

Continue Reading

Think Different, Add Quality

Think Different, Add Quality

Creating an innovative product and maintaining quality of your products is an art. Learn how great brands...

August 25th, 2021

Continue Reading

Sri Lankan Businesses: Next Generation of Technology Leaders Required

Sri Lankan Businesses: Next Generation of Technology Leaders Required

Solving problems is a fundamental use of technology. It's time organisations think of technology apart...

August 25th, 2021

Continue Reading

CyberLabs Implemented an Information Security Management System 100% Remotely in Australia

CyberLabs Implemented an Information Security Management System 100% Remotely in Australia

CyberLabs, the renowned cybersecurity solution provider, who is a member of SLASSCOM, successfully completed...

June 14th, 2021

Continue Reading