Thursday, May 16, 2024

Bipin Choudhary

110 POSTS1 COMMENTS
https://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

Thanos Ransomware : Another Popular Ransomware family

Thanos Ransomware is a new Ransomware-as-a-Service(RaaS) tool, which has immense popularity in underground forums. Thanos was discovered to be the sole ransomware family which was...

The Austria’s largest ISP Data breached by Hacker

A1 telecom has the news report that it takes a total of 6 Months to kick the hackers out of the network. According to the...

AWS S3 Buckets again Exploit by the Hackers

Many times I have mentioned about the AWS S3 and all time the same exploitation happens with the server. The threat actors are working...

40 Million Android Snap Tube Application User are at risk : Report

Finding the source and researching the root of news behind 40 Million Android users whose privacy is at risk. This is an alert message...

Open the Incident of Godaddy Data breach

Finally, Godaddy opens up on the data breach which impacts the web hosting accounts security that happens between October 2019. Talking about Godaddy Godaddy is the...

Delhi is now India’s hacker Hub : Report | Is it true but how ?

While finding the facts about the news there come many points that I will discuss in the article. First things are mentioned in reports...

Hacking challenge at Pentagon | Participants get Cash Prize

Pentagon research agency that developed the internet and GPS which calls the hacking group to participate to find the flaw in the new mega...

What is Honeypots ? What are the types ?

Honeypots are a system or you can say a server that can be deployed side by side by the production systems within your network....

What is spoofing ? What are the types and prevention measure ?

Spoofing is an act or practice which can be disgusting as a legitimate source and gain sensitive information which can help the attacker to...

Hacker access over 3.8 crore accounts of Digi locker

Indian Digi Locker has some bugs which lead hackers to steal around 3.8 crore accounts data without the requirement of Password. Let me tell you...

TOP AUTHORS

Most Read

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...