Punjab National Bank Was Hacked : ATM Screen Shows Hill Climb Racing game

Punjab National Bank ATM Hacked: The Punjab National Bank ATMs had a significant security vulnerability. Rather than the transaction screen, Popular Game Hill Climb Racing was displayed on the ATM’s screen. According to researchers, the computers were running the Windows operating system, and the attackers may have attacked using the skimmer method, which is rather …

Punjab National Bank Was Hacked : ATM Screen Shows Hill Climb Racing game Read More »

UK Based Staffing Agency publicly exposed thousands of worker data: Passports, Visas, CVs

Summary As Per the Research By Cybernews they said Tens of thousands of gig workers are at risk of identity theft and other scams due to the passports of these individuals being compromised by the UK hiring business Gigtogig. GigtoGig states that it collaborates with well-known companies like G4S, Hilton, Sainsbury’s, and Marriott. Businesses can …

UK Based Staffing Agency publicly exposed thousands of worker data: Passports, Visas, CVs Read More »

Atomic Malware is causing serious data theft on MacOS can be purchase on Telegram

Summary What is Atomic macOS Stealer (AMOS) ? Its objective is to take private information from compromised systems, such as passwords, autofill information, and cryptocurrency wallet contents, and deliver it back to a threat actor. After running a sample of the Atomic Stealer on our test system, it faked a pop-up window and asked the …

Atomic Malware is causing serious data theft on MacOS can be purchase on Telegram Read More »

GROK AI: Elon Musk X is violating user rights by feeding personal data to train it’s Grok Model

Summary: The legal dispute between X* and Ireland’s Data Protection Commissioner (DPC) about the former’s illegal use of user data to train the Grok model has come to an end. Grok was trained by X using European user data between May 7 and August 1, as well as on August 8. After the DPC sued …

GROK AI: Elon Musk X is violating user rights by feeding personal data to train it’s Grok Model Read More »

0 Day in Google Chrome was exploited by North Korean Hackers : CVE-2024-7971

Summary: North Korean actors utilised a recently patched security vulnerability in Google Chrome and other Chromium web browsers as a zero-day exploit in an effort to distribute the FudModule rootkit. Attacks using the recently fixed CVE-2024-7971 have been carried out by the hacker organisation Citrine Sleet, which is presumed to be a sub-organisation of the …

0 Day in Google Chrome was exploited by North Korean Hackers : CVE-2024-7971 Read More »

Hackers use URL Shortner to hide malicious links and redirect victims to phishing pages.

You have probably used url shorteners to make long, bulky links shorter and easier to send, but did you know that hackers are now able to access your devices using this technology. They are used by hackers to hide phishing pages and links that lead to malicious websites. According to research, link shorteners can be …

Hackers use URL Shortner to hide malicious links and redirect victims to phishing pages. Read More »

FBI Alert #StopRansomware :  RansomHub Ransomware Breaches 210 victims in 6 months

Affiliates of the RansomHub ransomware have compromised over 210 victims from a variety of important U.S. infrastructure sectors since the malware first appeared in February 2024. Understanding RansomHub This relatively recent ransomware-as-a-service (RaaS) method demands victims to keep stolen files secret and, if agreements fail, distributes the information to the highest bidder. The ransomware gang …

FBI Alert #StopRansomware :  RansomHub Ransomware Breaches 210 victims in 6 months Read More »

Million Websites Affects By Vulnerability in WordPress Plugin : CVE-2024-6386

Alert: It was discovered that WPML, a popular plugin for building multilingual WordPress sites with over a million active installations, is vulnerable to server-side template injection attacks. This makes it the third plugin that has needed an immediate upgrade in just the past two weeks. Under the handle “stealthcopter,” a security researcher has figured out …

Million Websites Affects By Vulnerability in WordPress Plugin : CVE-2024-6386 Read More »

2024 Zero Day Vulnerability in Google Chrome CVE-2024-7965 : How To Secure Yourself

Zero Day Vulnerability in Google Chrome : In order to prevent cyberattacks, users are advised to update their browser right away. Chrome in there official blog channel said “With great pleasure, the Chrome team announces that Chrome 128 has been promoted to the stable channel for Linux, Mac, and Windows. This will be implemented over …

2024 Zero Day Vulnerability in Google Chrome CVE-2024-7965 : How To Secure Yourself Read More »

Scroll to Top