Wednesday, May 8, 2024

Bipin Choudhary

110 POSTS1 COMMENTS
https://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

Exposing 185M+ Indian Personal Information, you be the next

A bad news for all the Indian License user for getting their data exposed from Government official website due to some bad vulnerabilities. After...

CryptoCore Hacker Makes the Big Bucks

Made the Big Bucks by the CryptoCore Hacker.The CryptoCore Group which made away with the millions from online cryptocurrency exchanges.  Scenario :  CryptoCore is the organized...

Lucifer Malware : Windows Vulnerabilities for Cryptomining

Getting News, the Lucifer Malware Leverages windows which are vulnerabilities for the Cryptomining and the DDoS attack done by the threat actor. The gain popularity...

Thousands of Printers Exposed Online leaking WiFi SSIDs

According to the News Thousand of Printers Exposed online SSIDs and other data leaked. That was around ten of thousands of printers exposed online...

Wikileaks Owner charged for the involvement in conspiracy

With Report of Different media, The United States Government has filed a superseding indictment against the WikiLeaks founder Julian Assange which accuses him of...

Russian Hacker Evil Crop Group targets US workers at home

Let's talk about the Russian hacker group which launches ransomware attacks against a number of US companies that target employees who are working from...

New Ransomware Attacks : Android Devices are under threat

New ransomware attack on the android devices which encrypt Photos and Videos Posing as COVID-19 Tracing Applications. New ransomware which hit the android users for...

Botnet Satori creator arrested poisoned for 13 months

The creator of Satori Botnet has been the creator sentenced to prison for compromising the thousands of devices. A teenager who is around 22-years has...

Chinese bank: Malware Embedded Tax Software are Forcefully Installed

Advanced Persistent Threat (APT) is a campaign aimed at stealing sensitive information from corporations in china.  The malware GoldenSpy was observed by the Trustwave SpiderLabs...

Cisco Webex Meeting: Windows User Sensitive Data at Risk

While Scrolling the News, I found that the Cisco Webex Meeting App for the Windows user that allows authentication for the local attacker to...

TOP AUTHORS

Most Read

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...