The research revealed that nine out of fourteen android apps, which have more than 30 million users, are potentially leaking data. The top 14 Android apps with over a hundred million installs are at risk for being Firebase misconfigured. Unauthorized parties might access these apps and expose confidential data. Almost everyone has an Android app installed on...Continue Reading
Cyberattacks have been utilizing cloud applications as an avenue of distributing malware, as per recent studies. Researchers have identified that 68% of malware downloads were derived from cloud applications for the 2nd quarter of 2021. Cloud-based misconfigurations are often a contributing factor in terms of these issues. About 66.4% of malware downloads for the 2nd...Continue Reading
Official data has shown that for the year 2020, India has recorded over 50,053 cases of cybercrime, and 11.8% of it has been a surge of offences over the prior fiscal year. Following the country’s measuring system incidents per lakh population, the cybercrime rate in India has also grown from 3.3% last 2019 to up to...Continue Reading
Security researchers have identified a flaw towards Azure cloud, which threatens its customers about unauthorized hacker access through their data. This warning came from Microsoft themselves. The tech company said from their security team’s blog post that the flaw reported by Palo Alto Networks has already been fixed and worked on. They also added no evidence of abuse...Continue Reading
According to Lacework analysts, Docker, Redis, SQL, and SSH have been the main targeted cloud servers in the last three months. As reported by Lacework’s 2021 Cloud Threat Report Volume 2, a lot of firms must now count cyber threat actors as their competitors. This is due to these two main reasons: cybercriminals are extending...Continue Reading
As for Singtel, a Singaporean telecommunications corporation that reached over 180,000 new 5G network subscribers and expanded with new commercial use cases which operate on the 5G standalone network, their government has advised stronger security and resiliency in ensuring the safety of the 5G networks. The 5G networks are mostly software-driven systems that are essentially...Continue Reading
The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records. Health insurers or related...Continue Reading
A surge of cyberattacks on cryptocurrency businesses has been seen recently by the cybersecurity community. We all know that cryptocurrencies are fully decentralized. They have no authority that monitors crypto activities and transactions, which provides a free hand to threat actors to conduct attacks at their will. This fact, in addition to the soaring value...Continue Reading
Ethical hackers and cybersecurity researchers disclosed more information on how multiple websites of the Indian government got hacked and breached. Just last month, researchers from the Sakura Samurai hacking group had discovered and disclosed their breach and findings via a large number of critical vulnerabilities on the cyber systems of the Indian government. The full...Continue Reading
A 50,000 USD reward program recently made a noise because it was awarded to an independent researcher who submitted a vulnerability found on Microsoft and Instagram accounts to bypass the mentioned platform’s account recovery program service. Despite its high-level security to avoid such intrusion on their user’s account, the researcher was able to crack the...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.