ethicalhackersacademy
DNSpooq Vulnerability  In DNS software Let Attackers hijack Millions of Network Devices

DNSpooq Vulnerability In DNS software Let Attackers hijack Millions of Network Devices

Recently, cybersecurity experts have detected nearly 7 vulnerabilities in a very popular DNS software set that has been executed in routers and...
Security Researchers Gained Access to Git Repositories of the United Nations

Security Researchers Gained Access to Git Repositories of the United Nations

The security experts of Sakura Samurai have managed to get access to more than 100,000 personal records and credentials belonging to United...
Multiple Flaws With Fortinet FortiWeb WAF Would Allow Attackers to Hack Corporate Networks

Multiple Flaws With Fortinet FortiWeb WAF Would Allow Attackers to Hack Corporate Networks

The cybersecurity researchers of Positives Technologies have detected some severe flaws in the Fortinet FotiWeb web application firewall. According to the security...
Ways Defense Contractors Can Improve Cybersecurity and Compliance

Ways Defense Contractors Can Improve Cybersecurity and Compliance

The discovery of information leaks of sensitive data has prompted lawmakers to amend policies and oversight protocols that are kept in place...
Fake Trump’s Scandal Video Used to Deliver QNode Malware

Fake Trump’s Scandal Video Used to Deliver QNode Malware

The cybersecurity researchers at Trustwave have identified a new Mailspam campaign while reviewing a spam trap. However, this campaign shares a remote...
Streaming Wars as a Hotbed for Cybercriminals: Scope and Attacks

Streaming Wars as a Hotbed for Cybercriminals: Scope and Attacks

Time and again, Cybercriminals have forayed into the digital space, mostly convoyed with newer strategies to breach, attack, and plunder us of...
Google Docs Bug Let Hackers Hijack Screenshots

Google Docs Bug Let Hackers Hijack Screenshots

Google has mentioned a flaw that has taken place recently in its feedback tool, and Google affirmed that there is a critical...
GDPR & HIPAA Compliance – Key Similarities and Differences in the Compliance Requirements

GDPR & HIPAA Compliance – Key Similarities and Differences in the Compliance Requirements

Introduction Privacy Regulations has for long been a major concern for most businesses processing or dealing with Personal Data....
Leveraging SOC 2 compliance for Cloud (SAAS) services

Leveraging SOC 2 compliance for Cloud (SAAS) services

In a digital world where we often witness high-profile attacks, and incidents of a data breach, considering the implementation of effective security...
Types of Malware

10 Different Types of Dangerous Malware Attack and How to Avoid them

Today's topic is basically about types of malware, yes, it's a malicious software which is basically designated to damage, impair, or exploit...