ethicalhackersacademy
Google Docs Bug Let Hackers Hijack Screenshots

Google Docs Bug Let Hackers Hijack Screenshots

Google has mentioned a flaw that has taken place recently in its feedback tool, and Google affirmed that there is a critical...
GDPR & HIPAA Compliance – Key Similarities and Differences in the Compliance Requirements

GDPR & HIPAA Compliance – Key Similarities and Differences in the Compliance Requirements

Introduction Privacy Regulations has for long been a major concern for most businesses processing or dealing with Personal Data....
Leveraging SOC 2 compliance for Cloud (SAAS) services

Leveraging SOC 2 compliance for Cloud (SAAS) services

In a digital world where we often witness high-profile attacks, and incidents of a data breach, considering the implementation of effective security...
Types of Malware

10 Different Types of Dangerous Malware Attack and How to Avoid them

Today's topic is basically about types of malware, yes, it's a malicious software which is basically designated to damage, impair, or exploit...
Ransomware Operators Using SystemBC Backdoor with Tor proxy & RAT Futures to Attack New Targets

Ransomware Operators Using SystemBC Backdoor with Tor proxy & RAT Futures to Attack New...

SystemBC is a commodity malware sold on undercover marketplaces; ransomware-as-a-service (RaaS) operations are practicing this malware to disguise all kind of malicious...
TinyCheck – Kaspersky Released a New Tool to Easily Capture Network Communications From a Smartphone

TinyCheck – Kaspersky Released a New Tool to Easily Capture Network Communications From a...

Kaspersky has published a very new tool "TinyCheck" to celebrate the International Day for the Elimination of Violence Against Women and the...
High-Severity Chrome Bugs Allow Hackers to Compromise the Browser – Update Now!!

High-Severity Chrome Bugs Allow Hackers to Compromise the Browser – Update Now!!

Google released a new Chrome 87.0.4280.88 update for Windows, Mac and Linux with the fixes of high severity vulnerabilities that allow attackers...
China-linked APT10 Hackers Attacking Organizations using the recently-Disclosed ZeroLogon vulnerability

China-linked APT10 Hackers Attacking Organizations using the recently-Disclosed ZeroLogon vulnerability

Recently, a large-scale attack campaign from an APT10 hacker group is attacking a multitude of Japanese companies, that include subsidiaries that are...
Russian Hacker Sentenced to Eight Years in Prison for Role in $100 Million Botnet Scheme

Russian Hacker Sentenced to Eight Years in Prison for Role in $100 Million Botnet...

Recently, a U.S. judge has sentenced a Russian national to eight years in prison for stealing all personal and financial data through...
Hackers Actively Exploiting a Critical Oracle WebLogic Vulnerability (CVE-2020-14882)

Hackers Actively Exploiting a Critical Oracle WebLogic Vulnerability (CVE-2020-14882)

Recently, many hackers have started investigating all the server those are using the Critical Oracle WebLogic. It is vulnerable to a decisive...