250 Million Microsoft Customer Support Records Exposed Online

If you have ever contacted Microsoft for support in the past 14 years, your technical query, along with some personally identifiable information might have been compromised.

Microsoft today admitted a security incident that exposed nearly 250 million … Continue reading 250 Million Microsoft Customer Support Records Exposed Online

PoC Exploits Released for Citrix ADC and Gateway RCE Vulnerability

It’s now or never to prevent your enterprise servers running vulnerable versions of Citrix application delivery, load balancing, and Gateway solutions from getting hacked by remote attackers.

Why the urgency? Earlier today, multiple groups publicly re… Continue reading PoC Exploits Released for Citrix ADC and Gateway RCE Vulnerability

Xiaomi Cameras Connected to Google Nest Expose Video Feeds From Others

Internet-connected devices have been one of the most remarkable developments that have happened to humankind in the last decade. Although this development is a good thing, it also stipulates a high security and privacy risk to personal information.

In… Continue reading Xiaomi Cameras Connected to Google Nest Expose Video Feeds From Others

14 Ways to Evade Botnet Malware Attacks On Your Computers

Cybercriminals are busy innovators, adapting their weapons and attack strategies, and ruthlessly roaming the web in search of their next big score.

Every manner of sensitive information, such as confidential employee records, customers’ financial data… Continue reading 14 Ways to Evade Botnet Malware Attacks On Your Computers

Europol Shuts Down Over 30,500 Piracy Websites in Global Operation

In a coordinated global law enforcement operation, Europol has taken down more than 30,500 websites for distributing counterfeit and pirated items over the Internet and arrested three suspects.

Among other things, the seized domains reportedly offered… Continue reading Europol Shuts Down Over 30,500 Piracy Websites in Global Operation

Latest Kali Linux OS Added Windows-Style Undercover Theme for Hackers

You can relate this:

While working on my laptop, I usually prefer sitting at a corner in the room from where no one should be able to easily stare at my screen, and if you’re a hacker, you must have more reasons to be paranoid.

Let’s go undercover:

Continue reading Latest Kali Linux OS Added Windows-Style Undercover Theme for Hackers

Google offers up to $1.5 million bounty for remotely hacking Titan M chip

With its latest announcement to increase bug bounty rewards for finding and reporting critical vulnerabilities in the Android operating system, Google yesterday set up a new challenging level for hackers that could let them win a bounty of up to $1.5 m… Continue reading Google offers up to $1.5 million bounty for remotely hacking Titan M chip