Email:

Phone No.

Whatsapp

Blog

New Android Malware Targets Netflix, Instagram, and Twitter Users
New Android Malware Targets Netflix, Instagram, and Twitter Users
New Android Malware Targets Netflix, Instagram, and Twitter Users
New Android Malware Targets Netflix, Instagram, and Twitter Users

New Android Malware Targets Netflix, Instagram, and Twitter Users

New Android Malware Targets Netflix, Instagram, and Twitter Users A new Android malware known as MasterFred uses fake login overlays to steal the credit card information of Netflix, Instagram, and Twitter users. This new Android banking trojan also targets bank customers with custom fake login overlays in multiple languages. A MasterFred sample was first submitted to

These Invisible Characters Could Be Hidden Backdoors in Your JS Code

These Invisible Characters Could Be Hidden Backdoors in Your JS Code Could malicious backdoors be hiding in your code, that otherwise appears perfectly clean to the human eye and text editors alike? A security researcher has shed light on how invisible characters can be snuck into JavaScript code to introduce security risks, like backdoors, into your software. Also

NUCLEUS:13 TCP Security Bugs Impact Critical Healthcare Devices

NUCLEUS:13 TCP Security Bugs Impact Critical Healthcare Devices Researchers today published details about a suite of 13 vulnerabilities in the Nucleus real-time operating system (RTOS) from Siemens that powers devices used in the medical, industrial, automotive, and aerospace sectors. Dubbed NUCLEUS:13, the set of flaws affect the Nucleus TCP/IP stack and could be leveraged to

TeamTNT Hackers Target Your Poorly Configured Docker Servers

TeamTNT Hackers Target Your Poorly Configured Docker Servers Poorly configured Docker servers and being actively targeted by the TeamTNT hacking group in an ongoing campaign started last month. According to a report by researchers at TrendMicro, the actors have three distinct goals: to install Monero cryptominers, scan for other vulnerable Internet-exposed Docker instances, and perform

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us