Hackers allegedly leak data of Army personnel using Airtel network; company denies any breach

A Hacker Group has purportedly spilled information of Army staff utilizing the Bharti Airtel network in Jammu and Kashmir, notwithstanding, the organization has denied...
dark web

Child Pornography Website Taken Down from Dark Web

One of the most nefarious child pornography website which went by the name of “Welcome to Video” has been taken down and seized. Reportedly,...

PhoneInfoga – Advanced information gathering & OSINT framework

PhoneInfoga is one of the most exceptional devices to filter worldwide telephone numbers utilizing just free assets. The objective is to initially assemble standard...

Critical Exchange Server Flaw (CVE-2024-21410) Under Active Exploitation

Microsoft on Wednesday acknowledged that a newly disclosed critical security flaw in Exchange Server has been actively exploited in the wild, a day after...

Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage Campaign

The Russian nation-state threat actor known as APT28 has been observed making use of lures related to the ongoing Israel-Hamas war to facilitate the...

Microsoft Takes Legal Action to Crack Down on Storm-1152’s Cybercrime Network

Microsoft on Wednesday said it obtained a court order to seize infrastructure set up by a group called Storm-1152 that peddled roughly 750 million...

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor

The Iranian-origin threat actor known as Charming Kitten has been linked to a new set of attacks aimed at Middle East policy experts with...

Shellphish : A Phishing Tool

Shellphish is a tool used for phishing attacks, this tool offers phishing templates of more than 18 famous websites. NOTICE: This article is for educational...

Crunch: Password Attacks

  A crunch is a tool that is used to generate the wordlist, the wordlist is generated with all possible permutations and combinations, in which...

Ransomware-as-a-Service: The Growing Threat You Can’t Ignore

Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of ransomware, one trend that...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts