Sunday, May 12, 2024
Tags Data breach

Tag: data breach

13,000 Mobile phones IMEI Number are same in India

The report published by the Meerut police (India) has uncovered a security breach in the mobile phone company. They found 13,500 Mobile phones which...

Zee5 Hacked-150GB Data leaked from Video On demand Platform

Hackers are on their work and this time they hit an Indian Video On-demand platform ZEE5. ZEE5 data hacked and threatened to sell the...

Ransomware target Windows and Linux again.

Another target campaign is running by the cyber attacker which affects the windows and Linux systems in which they again use the ransomware methodology...

Taiwan’s Government Data found on Dark Web

From the Source, we found that the sensitive personal data which belongs to the Taiwanese people that was around 20 million has been found...

Remote worker are targeted by cyber criminals

Cybercriminals using the trusted brand names to exploit the Remote Worker for access to the login credentials. A few days back, the team observed...

Nworm : New TrickBot malware updates

The Cyber attackers used the TrickBot Malware has been updated with a new propagation module that is named “Nworm”.People who are in the cyber...

Joomla Data Breach around 2,700 users were affected

Joomla is a popular and free open-source content management system that is used for the publication of web content. A few days ago, the...

Million of Data leaked from Indian Payment App

From the source, Data breach happens with a mobile payment app called  Bharat Interface for Money(BHIM) which has been affected by millions of Data...

Bank of America Data Breach affects the clients

According to the source, Bank of America has mentioned in a statement that the data breach affected the clients who applied for the Paycheck...

Dark Web Hosting provider database leaked by Hacker

Today a hacker leaked the database of Daniel Hosting(DH), the free web hosting for the dark web services. According to the DH owner, Daniel...

Most Read

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...