EHA
Burp Suite 2020.2

Burp Suite 2020.2 Released – Download New Professional / Community Version 2020.2

Earlier today Burp Suite 2020.2 was released, this is the second update of the Burp suite in the year 2020. Burp Suite a leading Web vulnerability scanner, was written in Java and developed by PortSwigger...
Cyber Security Trends

Top Cyber Security Trends Expected In 2020

Cyber Security is vital for every business, it is import to protect your business against cyber attacks, a single cyber attack could cause serious damage. Cyber Security is the top priority for every organization...
Critical WhatsApp Flaw

Critical Ghostcat Vulnerability Allows Attackers to Inject any Files in Tomcat Webapp Directories –...

Tomcat is the widely used application server designed to execute Java servlets and render web pages using JavaServer Pages script. The Ghostcat is a serious flaw with the Apache-Tomcat server discovered by security researcher Chaitin...
Australian Organisations

Silence Hacking Group Threatens Australian Banks of DoS Attacks if Ransom Not Paid

Cybercriminals threatening Australian Organisations, primarily in the banking and finance sector of DoS attacks if they failed to pay a huge ransom in Monero cryptocurrency. The extortion campaign starts by sending an email sent to...
Google Lawsuit

New Mexico Filed Lawsuit Against Google for Spying & Collecting Personal Data From School...

We all know very well that the procedure of the tech giant Google for collecting personal data is really weird and not only that even Google has been criticized several times for this type...
WRECK DNS

Google Leaking Private WhatsApp Groups Links Online – Anyone Can Join Tens of Thousands...

Google mistakenly indexing private WhatsApp group links, and the group can be accessed by anyone with a simple search in Google and join a wide range of WhatsApp group chats. ...
Former Senior NSA Officials

Zero Trust – The Best Model For Strengthening Security in The Enterprise Networks –...

The zero-trust model to business security is actually proposed by the well-known Market research company, Forrester Research, almost ten years ago, and the fact is that it is one of the most challenging approaches...
Chrome 80

Chrome 80 Released for Windows, Mac, and Linux – Google Patched 56 Security...

Google released Chrome 80 for Windows Mac & Linux with various improvements and patches for 56 security vulnerabilities that affected chrome. Chrome 80.0.3987.8 roll out over the coming days/weeks and you can update...
Twitter Hacked – Hackers Exploited Twitter Vulnerability To Match Usernames to Phone Number using Fake Accounts

Twitter Hacked – Hackers Exploited Twitter Vulnerability To Match Usernames to Phone Number using...

State-sponsored hackers exploited Twitter API vulnerability using a larger number of fake accounts to match the usernames to the phone numbers. Twitter observed a high volume of IP requests coming from particular countries, and the...
Ring Doorbell App

Ring Doorbell App Caught Sharing User Data to Analytics and Marketing Companies

Ring Doorbell App used to monitor your home through your smartphones, PC or Tablets. Every device includes a lens, a built-in microphone, and a speaker. So with the app you can watch and speak to...