Sunday, May 12, 2024

Bipin Choudhary

110 POSTS1 COMMENTS
https://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

After Ransomware attacks Cognizant Confirms Data Breach

The most reputed and giant IT company suffered from the ransomware attacks last April which caused service disruptions to the clients. People Know about the...

Zoom provide End-to-End Encryption for the free users : Report

On Zoom announced on Wednesday that they had decided to provide end-to-end encryption for all customers, meaning the customers who are not using the...

What is Session Hijacking ? what are the methods ?

Session Hijacking is an attack where a user session has been taken over by the attacker. When as the session starts by logging in...

CIA failed to protect the Top-secret hacking tools : Report

As getting the reports, the CIA got compromised by their data that was at least 180 gigabytes to as much as 34 terabytes of...

TIDoS- Web Application Audit Framework and Open Source

TIDoS Framework that was totally developed under python programming which can perform a comprehensive audit of the web applications. This toolkit has totally packed...

Cryptocurrency Miners : Affect European Airport Workstation by 50%

When we talk about the Cryptocurrency miners which can infect about 50% of the workstation at European International Airport. Malware affects the entire system of...

What is Social Engineering ? How thing work inside ?

Social Engineering is the technique performed by the threat actors who have the intention to exploit human weakness. The involvement of various techniques which...

NASA affected by 366% of Cyber attack in 2019

From the Era between 2018 to 2019, the cyber incident in NASA has increased by nearly about 366% and there is rapid growth in...

VMware Fixes the Flaw that affects Workstation

VMware got vulnerability which affects the multiple products which allow threat actors to get sensitive information from the user. Vulnerabilities Found in VMware CVE-2020-3960 This is the...

What is a VPN ? Why we really need this ?

What is a VPN? When we are talking about a virtual private network (VPN) which gives you online privacy and anonymity means a hidden way...

TOP AUTHORS

Most Read

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...