Introduction to Code Injection Vulnerabilities Code injection is an attack where the attacker tries to inject a code that can…
The rate of cybercrime increased in the first half of 2020 due to the pandemic. The total volume of cyber…
Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS cloud environments, and many more…
Introduction to Maze Ransomware - Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered…
Introduction Looking for something exciting and a secure way to protect your secrets? Zero Knowledge Proof Protocol has the potential…
“We are in the most popular world of – Black hat hacker” What is Formjacking Attack? The year's rampant threat…
There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the…
Ransomware Attack Targeting China - Security Advisory 1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a…
Tecnimont Cyber Theft - Security Advisory Background: Maire Tecnimont SpA is the parent company of the Italian group Maire…