Latest Cyber Security news

AIIMS Server Hacked

AIIMS Server Hacked – Hacker Demand 200 Crore in Cryptocurrency

The All India Institute of Medical Sciences (AIIMS), Delhi's server has been down for six days in a row, and sources told news agency...
Fake Android SMS on Google Play

Fake Android SMS APP on the Google Play Steal Phone Numbers to Verify &...

Evina's security researcher Maxime Ingrao identified a fake Android SMS APP on Google Play ‘Symoo’, with 100,000 downloads actually serving as an SMS relay...
13 New Vulnerabilities in BMC Firmware Let Hackers Launch Remote Attacks on OT & IoT Networks

13 New Vulnerabilities in BMC Firmware Let Hackers Launch Remote Attacks on OT &...

BMC (Baseboard Management Controller) firmware from Lanner has been found to contain over a dozen vulnerabilities that could allow remote attacks to be launched...
U.S. Banned Chinese

U.S. Banned Chinese Telecom & Surveillance Cameras That Pose National Security Threat

The US has banned the import and sale of Chinese telecom equipment and security camera systems from Huawei, ZTE, Hytera Communications, Hikvision, Dahua, Pacific...
Vendor SOC 1, 2 or 3 – Understanding the Differences

Vendor SOC 1, 2 or 3 – Understanding the Differences

Your vendors pose different types of risks to your business and organization. Make sure they comply with industry standards. Deal with a SOC-compliant vendor...
Massive Twitter Breach

Massive Twitter Breach – Over 5.4 Million users’ Data Leaked Online

It has been discovered recently that over 5.4 million personal records of Twitter users have been stolen by threat actors and publicly exposed on...
Chrome Zero-Day Flaw Actively Exploited in the Wild – Google Emergency Update!!

Chrome Zero-Day Bug Actively Exploited in the Wild – Google Emergency Update!!

The Chrome web browser for desktops recently received an emergency security update to address a zero-day vulnerability that has been found to be actively...
Study: Phishing Takes Up a Third of IT Time, Resources, and Budget

Study: Phishing Takes Up a Third of IT Time, Resources, and Budget

Phishing--the fraudulent emails and other communications that entice users to click on malware-ridden links or attachments, pay fake invoices, or update customer accounts with...
Website
Kerberos authentication is a cryptography-based protocol that is used to secure logins. The Kerberos is a mythological three-headed Greek creature. It guards the gates to prevent the soul from escaping. Due to this inspection, the Massachusetts Institute of Technology has developed a protocol to protect their project. Their main idea...

Top 10 Cyber Security Tools