Home Blog

IndiaMART data breached

IndiaMART, India’s largest online B2B marketplace for business products and services with 10 million downloads suffered a breach. Sensitive data of more than 40,000 suppliers is believed to be leaked and sold on online forums. Information leaked include suppliers’ user IDs, full names,...
Read More

Foodora Data Breach

Foodora, a brand of online food delivery service Delivery Hero has suffered a data breach. Exposing the user account details of 727,000 customers in the following 14 countries: United Arab Emirates, Singapore, Germany, Spain, France, Liechtenstein, Italy, Austria, Hong Kong,...
Read More

Massive campaign against WordPress websites

In a massive attack on WordPress sites hackers tried to download configuration files by attacking old vulnerabilities in unpatched plugins to steal database credentials. To take over databases, old exploits were used to download or export wp-config.php files from unpatched websites, extract database...
Read More

Critical update: Webex users phished

An ongoing phishing campaign is targeting remote workers who, due to ongoing covid -19 are relying on conferencing tools like Webex. Hackers are targeting victims with mails claiming to be a Cisco critical security advisory and asking them to update, to steal their Webex credentials.   The malicio...
Read More

KrØØk vulnerability affects more than one billion Wi-Fi-enabled devices and access points

The critical security flaw could intercept and allow an attacker to decrypt wireless network packets transmitted by vulnerable devices using WPA2 connections.  The Kr00k bug (CVE-2019-15126) affects common Wi-Fi chips Broadcom and Cypress which are built in access points (APs) and smartphones, ta...
Read More

Bluetooth vulnerability on Android

A newly discovered Bluetooth vulnerability on Android lets attackers execute arbitrary code and silently take remote control of Device without user interaction. Security researchers discovered that Android 8 and 9 were affected by this vulnerability. Android 10 is not vulnerable but it leads to...
Read More

Automotive Cybersecurity

Sophisticated Vehicles today are connected with Bluetooth, Wi-Fi and many more apps making our lives easier, safer and more comfortable. Technology is rapidly advancing in the automotive space to meet user’s demand for convenience, also making vehicles susceptible to hackers, opening them to ...
Read More

IoT Cyber security

IoT (Internet of Things) is any networking of a device that connects to the Internet in order to exchange data. Electrical devices to home appliances are now connected and can be controlled remotely through internet, they offer convenience in our everyday lives and can also help boost productivity. ...
Read More

Restrict Third-party data sharing: FACEBOOK

Most people in the world have at least one Facebook account, making Facebook one of the biggest advertising platforms. Facebook has faced a lot of criticism over privacy and data breach controversies, as it collects users information by tracking their activities on internet. Online apps and websit...
Read More

Juice Jacking

A type of physical access attack on a Device or Data, Juice jacking also known as USB scam can be used to install malicious software through public charging stations. At times, using public charging stations is not avoidable, putting us at risk of getting hacked. A USB port can be used as power sock...
Read More

Social Engineering

A clip from the new Netflix series Jamtara, doing rounds on social media shows how easily a retiree is getting conned out of his life savings through a simple phone call. This type of digital scam is known as social engineering. Social engineering is manipulating human psychology to maliciously gain...
Read More

Windows 10 Critical Security Flaw

The existence of a major vulnerability in Windows 10 was confirmed on Jan 14 2020 by the NSA. This is a critical bug that impacts millions of windows 10 users worldwide. Ann Newberg, director cybersecurity NSA, disclosed the vulnerability to Microsoft. Reporting of vulnerability is considered an unp...
Read More

10 Most Important Cyber Security Tips

1. You Are A Target. Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.” 2. Eight Characters Is Not Enough. Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your pa...
Read More

New Critical Exim Flaw Exposes Email Servers to Remote Attacks

A critical security vulnerability has been discovered and fixed in the popular open-source Exim email server software, which could allow a remote attacker to simply crash or potentially execute malicious code on targeted servers. Exim maintainers today released an urgent security update—Exim versi...
Read More

Hackers abuses Google acquisition domains appspot.com and web.app in latest phishing attacks

These attacks make use of SSL certificates issued by Appspot.com and Web.app. The attackers have designed similar-looking login pages for the domains which are widely used in business. These fake login pages can be used to trick the victims and steal their Usernames and Passwords About domains Appsp...
Read More