Microsoft is tracking threat actor activity using the CVE-2020–1472 Netlogon EoP vulnerability exploit called Zerologon. They have seen attacks where public vulnerabilities have been inserted into attackers playbooks. According to security industry... Read more »
Confidential computing is a practice in which encrypted data stored in memory to restrict access for the security of the data in use. Confidential computing uses hardware-based techniques to detach data, individual... Read more »
Location Tracking risks and Location tracking prevention best practices. 1. Turn off location services in your device’s settings. 2. Disable wireless radios when you are not using them. Read more »
The Great Firewall of China (GFW) started blocking ESNI — one of the key features of TLS 1.3 and HTTPS. The Chinese government has deployed an upgrade to its Great Firewall (GFW)... Read more »
Intel data leaked over 20 GB in online file sharing websites like Mega. Intel is investigating a major leak from internal business files. Read more »
Microsoft introduced Double Key Encryption preview for data generated with Microsoft 365 applications using two keys to access secure information, Read more »
Unprotected Elasticsearch and MongoDB were targeted against hacking attacks. The attacker leaves Meow Signature on the logs after removing data. Read more »
Here we explained different ways How you can secure your iPhone and protect your data from strangers and cybercriminals. Read more »
EncroChat is now hacked by police and arrested the whole gang.EncroChat is one of the largest encoded messaging providers. Read more »
Recent explosion of free, public WiFi has been a tremendous boon for people, but public WiFi users are unfortunately at risk from hacker. we can avoid risks by following some precautions. Read more »