Category: CyberSecurityNews
The use of a set of methods to take advantage of vulnerabilities like misconfigurations and poor security protocols in a…
TCP SYN Flood attacks are the most popular ones among DDOS attacks. Here we are going to discuss in detail,…
Another breach has occurred at MailChimp, which allowed threat actors to access 133 customers’ data after hackers gained access to…
Indusface saw a 74% increase in the number of websites that experienced DDoS attacks from Q3 to Q4 of 2022….
Orca recently conducted an investigation into several Microsoft Azure services and discovered four instances where various services were uncovered to…
OAuth 2.0 is the industry-standard protocol for authorization. OAuth 2.0 supersedes the work done on the original OAuth protocol created…
Cyble Research & Intelligence Labs (CRIL) discovered a brand-new malware variant called “Rhadamanthys Stealer.” This malware stealer variation is now…
It has been reported that a group or individual, whose identity is currently unknown, has released a new “backdoor.” This…
The consumer VPN market has seen explosive growth in the last few years due to the increasing popularity of VPN…
Digital certificates are electronic credential that binds the identity to the owner of the certificate which can also pair the…
In a recent incident, within just 24 hours of initial access, the IcedID (aka BokBot) malware was used to successfully…
Kerberos authentication is a cryptography-based protocol that is used to secure logins. The Kerberos is a mythological three-headed Greek creature….