T-Mobile Hacked – Over 37 Million Customer Data Exposed
T-Mobile US, Inc. discovered that a malicious attacker was illegally accessing data through a single Application Programming Interface (“API”). The research revealed that the threat…
T-Mobile US, Inc. discovered that a malicious attacker was illegally accessing data through a single Application Programming Interface (“API”). The research revealed that the threat…
While using web browsers, there are security threats that, if not careful, can allow cybercriminals to take over the browser and steal information. To ensure…
Trend Micro researchers have recently demonstrated that malware and malicious scripts can be hosted and distributed within GitHub Codespaces by malicious actors through the use…
In earlier years, everyone depends on SOC (including firewalls, WAF, SIEM,etc.) and the priority in building the SOC provides security and the CIA was maintained.…
The Sophos Firewall Webadmin and User Portal HTTP interfaces are vulnerable to unauthenticated and remote code execution, as stated in an alert released by Sophos…
GitLab has released fixes for two security flaws in Git that are of critical severity and might allow attackers to remotely execute arbitrary code and…
Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses the Weakness, technical flows, and…
A significant number of servers that use the Cacti software, and are connected to the internet, have not been updated to fix a security vulnerability…
CircleCI, a DevOps platform, discovered that malware installed on a CircleCI engineer’s laptop was used by an unauthorized third party to steal a legitimate, 2FA-backed…
Customers were notified by NortonLifeLock – Gen Digital that accounts for Norton Password Manager had been successfully breached. They made it clear that the breach…
Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator…
There have been a number of attacks against government organizations and government-related targets using FortiOS SSL-VPN zero-day vulnerabilities patched by Fortinet last month that have…