• Let Us Learn,  News and Threat Analysis

    MISCONFIGURED BGP PROTOCOL BY VODAFONE AFFECTED 20,000 GLOBAL NETWORKS ON THE INTERNET

    It is very natural for humans to do mistakes while doing work. Sometimes we do such kind of mistakes that has no effect on other’s life but sometimes we do such mistakes that has an adverse effect on other’s life. Infact, sometimes our mistakes can also turn someone’s life. If we talk about machines, we are the one who designs them. There is no doubt on this fact that nowadays machines can automate any tasks but we must also not forget this fact that machines run only on the scripted tasks that are written by humans. They do not have sense to judge the consequences. Although in today’s time, Artificial…

  • News and Threat Analysis

    A RESEARCH SAYS GOOGLE CAPTURES 20x MORE TELEMETRY DATA THAN APPLE DOES. ARE YOU USING GOOGLE OR GOOGLE IS USING YOU?

    It is generally quoted that “ The more information you have, the more you are ahead in the war…” We all know this thing that iOS and Android are among the top mobile OS when it comes to choosing user interface, functions, and compatibilities. There is no doubt on this fact that the market set by Google has a big number than its counterpart iOS, but what matters to us is who cares about our privacy more! As we move forward, we all are building are future more on automation and when the word automation comes to our mind, we have a slighter inclination towards Artificial Intelligence and Machine Learning.…

  • News and Threat Analysis

    NICOMINER GOES WILD, EXPLOITING MULTIPLE VULNERABILITIES TO MINE CRYPTOCURRENCY FROM SYSTEMS

    “NICO JIANG” – FROM A SMALL CRACKING TOOLS’ AUTHOR TO A MINER AUTHOR We all are adapting ourselves to the new normal where virtuality is the only way for authentication. But we can not ignore the fact that cryptocurrency is already known to get authentication without losing your identity. In this currency, authentication is just performed through a digital ledger and the identity of the person is kept anonymous. While some big influencers and celebrities like Elon Musk promote the use of this currency, from some past statistics, it has also been proven to be one of the best ways for the attackers to get paid for their illegal tasks.…

  • Let Us Learn,  News and Threat Analysis,  Tools, Tricks and More

    CHARMING KITTEN ONCE AGAIN COMES INTO SPOTLIGHT, GIVING CHRISTMAS AND NEW YEAR GIFTS TO ITS VICTIMS

    Last year might be one of the worst year for all of us as coronavirus affected our life in  every aspect, but cybercriminals made this year special for themselves as they made big numbers in their history. The year was all filled with cyberattacks either it was  tourism industry or it was a cybersecurity company. There were huge leaks of databases by these criminals, there were privacy issues that come into notice, for some it was going absolutely wrong but still, for some it was going alright. When the year was coming to end, we all were excited for the new year, we all were looking for a new and…

  • News and Threat Analysis,  Tools, Tricks and More

    UNCONFIGURED REDIS DBMS EXPOSE THOUSANDS OF SERVERS TO MINING TROJANS

    HACKERS RUSH IN DEPLOYING MINERS AFTER SURGE IN BITCOIN MARKET VALUE Though banned in many countries, virtual and digital cryptocurrencies have caught many investors’ eyes in the last few days. There is no doubt on this fact that these currencies are not meant for short term profits but its long-term profits are much more valuable than investing in some future goal funds. Thus, for some who already know about it and have invested a lot by taking risks, this investment has turned out to be an ace of spades that has made huge profits for them. Cryptocurrencies are one of the major sources of anonymity by hackers. If we go…