Thursday, May 9, 2024
Tags Data theft

Tag: data theft

CIA failed to protect the Top-secret hacking tools : Report

As getting the reports, the CIA got compromised by their data that was at least 180 gigabytes to as much as 34 terabytes of...

Nworm : New TrickBot malware updates

The Cyber attackers used the TrickBot Malware has been updated with a new propagation module that is named “Nworm”.People who are in the cyber...

Joomla Data Breach around 2,700 users were affected

Joomla is a popular and free open-source content management system that is used for the publication of web content. A few days ago, the...

70 Million records Leaked from Aussie Football Site

According to the source, an Australian football fan site has been under threat and it was found that around 70 million records have been...

Kaspersky Lab : NSA contractor Victimizes the PC

Later on, a report came from the Kaspersky lab that suspected theft by the Russsian Spies of NSA hacking tool from their own contractor...

Data Breach : 600+ data of NTT Telecom customer are stolen

One of the largest telecoms and IT services companies has revealed that the attacker may have stolen the data from the internal system and...

8 billion Thai internet records leaked !

From Source, It started on 7 May and it took too long time May 22 to secure the database. Cyber experts discovered an exposed...

Most Read

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...