Cyber Attack

CrowdStrike says over 97% of Windows sensors back online

CrowdStrike says over 97% of Windows sensors back online

More than 97% of Windows sensors were online as of Wednesday evening, CrowdStrike said in an update posted on its website. The systems are nearly fully restored after the company's July 19 software update crashed millions of Windows-based devices and froze corporate networks

Canara Bank's official social media HAcked

Canara Bank's official social media HAcked

Canara Bank's official social media handle on X (formerly Twitter) has been hacked. The hacker changed the username of the handle to 'ether.fi'.  Currently, Canara Bank's official account (@canarabank) has 2.55 lakh followers. However, the bank has yet to take action in response.

Personal data of 7.5 million Boat customers data leaked on dark web

Personal data of 7.5 million Boat customers data leaked on dark web

Boat, one of India's leading wearables brands in India, has reportedly suffered a massive data breach. According to a report by Forbes India, personal data of more than 7.5 million customers has been leaked on the dark web. The report cites a hacker named ShopifyGUY, who claims to have leaked the data on dark web.

61 Pakistani Websites Hacked on Valentine's Day

61 Pakistani Websites Hacked on Valentine's Day

UCC Hackers Team Strikes: 61 Pakistani Websites Defaced on Valentine's DayThe targeted websites, spanning governmental agencies, educational institutions, and commercial enterprises, fell victim to the calculated maneuvers of the UCC Hackers Team

Password Attack Threat?

Password Attack Threat?

The term “attack” is used here to denote performing a variety of hacks, including brute force and social engineering, that require access to the target’s computer system or network

Credentialed Vulnerability Scan?

Credentialed Vulnerability Scan?

Cyber Security prevention is the need of today’s generation. Awareness and knowledge of proper security techniques must be spread among the cyber-using generation to prevent frequent cyber attacks from taking place in the cyber world. Here, in this article, we will discuss one very important scanning technique – Credentialed Vulnerability Scan that has played a vital role in preventing cyber

What is DNS Footprinting?

What is DNS Footprinting?

What is DNS Footprinting?DNS Footprinting is a technique that is used by an attacker to gather DNS information about the target system. DNS Footprinting allows the attacker to obtain information about the DNS Zone Data