Advertisement

Hackers News

alt
The incident happened in April; Ajit’s account was debited twice for Rs 1,800 and Rs 1,400, respectively, the same day.
alt
White hats, who work for security companies or as freelancers, are responsible for bug hunting.
alt
The Pakistan-based group (dubbed as APT36) is using a malicious file titled "Revision of Officers posting policy" to lure the Indian Army into compromising their systems. The file is disguised as a legitimate document, but it contains embedded malware designed to exploit vulnerabilities, the team noted.
alt
Regarding the cyber attack on AIIMS, it has become clear that this attack was done by hackers from China. But now another big disclosure has come about the cyber attack. Which is bigger than the cyber attack on AIIMS. Which shows that the health sector of the country is in the hit list of cyber terrorists.
alt
India witnessed heightened cyber activity over the past few months Enemy countries often employ cyber espionage tactics to steal data According to Lok Sabha data, a total of 160,560 Indian websites were hacked between 2016 and 2021
alt
A spyware company has brought such an offer, which has created a lot of ruckus. She is claiming to hack any phone by taking money. The tweet has gone viral. Well-known spyware company Intellexa is now competing with NSO Group Pegasus Developers. About 64 crores is providing services to hack Android and iOS devices by taking iOS and latest Android 12 update.
alt
The Indian Computer Emergency Response Team (CERT-In) issued two advisory warning about major vulnerabilities in all three products. CERT-In issued a warning about various vulnerabilities in the Mac operating system. This data might be used to steal your money, send virus-infected emails to your contacts.
alt
The worst part is that there are official social media accounts connected to (and created by mails there were set up on) these websites which also could be compromised by hackers because of these flaws.
alt
The most commonly used names as passwords are included in the list. So, if you use any of the passwords listed below, change them right away.
alt
Online ransom activities lately saw an upward trend giving rise to hackers stealing the confidential data of different entities. Ritik believes that cybersecurity is crucial for any business to protect its data, thereby blocking data thefts.
alt
This scamming organisation has amassed almost $1.4 million in tokens, according to Sophos security researchers. The con entails duping a person and attempting to persuade them to install questionable apps that could compromise their data. Apps are delivered through websites that seem like bank websites.
alt
Poly Network added that the tokens were transferred to a multi-signature wallet controlled by both the platform and the hacker. A person claiming to have perpetrated the hack said Poly Network offered him a $500,000 bounty to return the stolen assets. The theft illustrates the risks of the mostly unregulated DeFi sector, said crypto experts.
alt
The demand was posted on a blog typically used by the REvil cybercrime gang, a Russia-linked group that is counted among the cybercriminal world`s most prolific extortionists. REvil`s ransomware attack, which the group executed on Friday, was among the most dramatic in a series of increasingly attention-grabbing hacks. About a dozen different countries were affected, according to research published by cybersecurity firm ESET.
alt
HackersEra has abruptly transitioned from offline to online collaborative work during this Pandemic. Some issues might be viewed as fundamentals that every person working in a different sector must master. HackersEra, as a Cyber-Security Service Provider, is responsible for staff Endpoint Security, which contains client data.
alt
Scientology is now targeting the Tesla CEO. They released the latest video where they targeted Elon, claiming the power he uses over cryptocurrency markets. Elon, recently announced that the company has stopped accepting bitcoin as payment for its cars out of concern- that it will contribute to greater consumption of fossil fuels.
alt
Microsoft has now warned against an ongoing "sophisticated" attack from Russia-based threat actors. 'Nobelium' launched the attacks by gaining access to the Constant Contact account of USAID. Constant Contact is a service used for email marketing.
alt
Apple AirTag is a small iPhone accessory that helps keep track of and find the items that matter most with Apple's Find My app. In short, the researcher proved it was possible to alter the programming of the microcontroller, to change how it functions. While only in its early stages, the research shows that it takes a lot of know-how and effort to hack AirTag in the first place.
alt
According to a report, hackers have now found new ways to steal your personal data and they are using SMS to rob data from your smartphones. Cox further revealed that the hackers carried out the attack in such a way that the victim would not even know that he has been targeted. This attack is aimed at getting access to information such as log-in to social media accounts associated with that phone number.
alt
Microsoft, meanwhile, faces scrutiny for its role in back-to-back cybersecurity breaches. In the first, the same allegedly Russian hackers who compromised the Texas software firm SolarWinds Corp also took advantage of Microsoft`s cloud software to break into some of the company`s clients. Google fired back, saying that Microsoft`s "newfound interest in attacking us comes on the heels of the SolarWinds attack.






Loading...
english news
NEWS ON ONE CLICK