Attackers exploiting an array of Google Services, including Forms, Firebase, Docs and more to boost phishing and BEC campaigns. A spike in recent phishing and business email compromise (BEC) attacks can be traced back to criminals learning how to exploit Google Services, according to research […]
The malware encryption service run by a Romanian duo helped hackers embed malicious code in legit software to bypass antivirus tools.In a press release, the European law enforcement agency Europol shared details of the arrest of a pair of malware encryption services operators based in […]
Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses the Weakness, technical flows, and Critical wireless Vulnerabilities. Most important countermeasures we should focus on Threat Assessment, Data theft Detection, security control auditing, Risk prevention […]
Facebook has patched a bug in its widely installed Messenger app for Android that could have allowed a remote attacker to call unsuspecting targets and listen to them before even they picked up the audio call. The flaw was discovered and reported to Facebook by […]