Leaks

Facebook removes suspected Russian accounts

Two-Factor Authentication Controversy Facing Facebook, User Mobile Numbers Used for Ads

Two-factor authentication has been a near silver-bullet that prevents phishing attacks and online account thefts. It is very effective, as it provides the user a virtual “second password”, which disables…

Read More
Ransomware Fileless Attacks and Cold Boot Impacting Enterprise Networks

Ransomware, Fileless Attacks and Cold Boot the Current Trend

A new breed of cyberattacks- ransomware, fileless attacks and cold boot- have been impacting enterprise networks worldwide and proving to be a real headache to many. The ransomware menace The…

Read More
Open EDR
The Dark Web is Coming to Your Mobile Phone

The Dark Web is Coming to Your Mobile Phone

Deep web and privacy enthusiasts have a lot to rejoice for as the Tor Project has announced that their popular Tor Browser is now available for Android. Members of the…

Read More
U.S Lawmakers Slam Google CEO for Declining to Testify at Senate Hearing

U.S Lawmakers Slam Google CEO for Declining to Testify at Senate Hearing

U.S lawmakers, a bipartisan group of them, have joined hands in slamming Google’s CEO for declining to testify at the Senate hearing next week. Fox News reports- “On the same…

Read More
Google Blocks YouTube Account linked to Iran

Google Blocks YouTube Account linked to Iran

In a recent statement Google said that it has disabled 39 YouTube Channels associated with Iranian state broadcaster, which is running a political campaign to influence its viewers. Google said…

Read More
What We Need To Learn From The Worlds Largest Data Leak

123,000 customer data exposed in two Thailand Banks Data Breach

Thailand’s two big banks are the newest victims of a data leak involving 123,000 customer records. This happened on the backdrop of Thailand’s push for more and more cashless transactions….

Read More
Hackers Snagged Reddit IT Admin Accounts

Hackers Snagged Reddit IT Admin Accounts

Reddit is the most known discussion forum on the internet, and later today they announced that the hacker managed to fiddle with their system and have managed to leak user’s…

Read More
Major Cyber Espionage vs Supply Chains Apps imminent US Intelligence Service

The Major Cyber Espionage vs Supply Chains Apps is Coming

The United States, through its intelligence agencies, has uncovered a major cyber espionage vulnerability against software-based supply chain software. A supply chain attack refers to a cyber attack of unauthorized…

Read More
Stolen manual for Reaper Drone sold in the Dark Web 1

Details On How To Build A MQ-9A Reaper Drone Just Sold On The Darknet For $200

After a digital manual for an MQ-9A Reaper drone belonging to the U.S. military was recently copied online without authorization, it came up for sale on the darknet at just…

Read More
Smart Google Search Queries and 4500 GOOGLE DORKS LIST

Smart Google Search Queries and 4500+ GOOGLE DORKS LIST

Google is an awful search engine which can’t avoid its basic duty of crawling websites. All things considered, Google works this way. It crawl sites and when individuals enter related…

Read More

Page 8 of 10

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password

Register