Thursday, May 9, 2024

Bipin Choudhary

110 POSTS1 COMMENTS
https://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

WolfRAT Malware affects Android Apps target Messenger Apps

For Android users they are always targeted by attackers. The New Malware WolfRAT has surfaced online that targets the messenger app in your android...

ESET Website under DDoS attack by Malicious Android App

For the last few months, Android Play Store has been in the news due to various malicious apps. This time no user has been...

The 5 Most Popular Penetration Testing Tools which you Found in Kali Linux.

When we talk about penetration testing means lots of people want to join the penetration tester in this new modern era. Many corporate companies...

How DDoS attack effect organization in 2020 ?

Distributed Denial of service(DDoS) DDoS attacks not always involved in a data breach and credential theft. When you talk along with the victim's perspective DDoS...

New Phishing Campaign theft LogMeIn Credentials

LogMeIn is another to the list of remote access and collaboration platforms to be targeted by phishing campaigns.   What is happening? According to researcher observation an...

GhostDNS Got leaked by Mistake !

Router Exploit Kits are gaining popularity these days in the hacker world. Talk about “ GhostDNS” which uses cross-site request forgery(CSRF) requests to alter the...

Data Breach : Folrida’s “Unemployment website” Suffers breach

On Thursday, Florida’s embattled unemployment claims system suffered a data breach. According to the Department of Economic Opportunity(DEO), the reemployment assistance claims website had...

What is Malware ? What are the Types ?

When we talk about malware, it directly points to the number of malicious software variants, ransomware, malware, and spyware. It typically consists of code...

Brazil’s Cosmetic Brand Natura Find Exposes their User Personal Details

According to Source, Brazil's biggest cosmetic company Natura has found leaked hundreds of gigabytes of their customer personal as well as payment-related information publicly...

North Korean Hackers Used 3 New Malware : US

According to News, on the 3rd anniversary of the infamous global WannaCry ransomware outbreak for which a country (North Korea) Blamed by U.S government...

TOP AUTHORS

Most Read

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...