Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

Peloton Bike+ Vulnerability Allowed Complete Takeover of Devices
Peloton Bike+ Vulnerability Allowed Complete Takeover of Devices
Peloton Bike+ Vulnerability Allowed Complete Takeover of Devices
Peloton Bike+ Vulnerability Allowed Complete Takeover of Devices

Peloton Bike+ Vulnerability Allowed Complete Takeover of Devices

Peloton Bike+ Vulnerability Allowed Complete Takeover of Devices A vulnerability in the Peloton Bike+fitness machine has been fixed that could have allowed a threat actor to gain complete control over the device, including its video camera and microphone. Peloton is the manufacturer of immensely popular fitness machines, including the Peloton Bike, Peloton Bike+, and the

Avaddon Ransomware’s Exit Sheds Light on Victim Landscape

Avaddon Ransomware’s Exit Sheds Light on Victim Landscape A new report analyzes the recently released Avaddon ransomware decryption keys to shed light on the types of victims targeted by the threat actors and potential revenue they generated throughout their operation. On June 11th, the Avaddon ransomware gang decided to shut down their operation. As part

Paradise Ransomware Source Code Released on a Hacking Forum

Paradise Ransomware Source Code Released on a Hacking Forum The complete source code for the Paradise Ransomware has been released on a hacking forum allowing any would-be cyber criminal to develop their own customized ransomware operation. Released on the hacking forum XSS, the link to the source code is only accessible to active users on

Google Workspace Adds New Phishing Protection, Client-side Encryption

Google Workspace Adds New Phishing Protection, Client-side Encryption Google Workspace (formerly G Suite) has been updated with client-side encryption and new Google Drive phishing and malware content protection. These new additions are part of a broader effort focused on more robust data security and follow the release of Safe Browsing, a blocklist service that protects

× Chat with us