MELTDOWN ATTACK
Meltdown is a hardware vulnerability affecting Intel x86 microprocessors, IBM POWER processors, and some ARM-based microprocessors. It allows a rogue process to read all memory, even when it is not authorized to do so.
Meltdown is a hardware vulnerability affecting Intel x86 microprocessors, IBM POWER processors, and some ARM-based microprocessors. It allows a rogue process to read all memory, even when it is not authorized to do so.
Here is the list of world’s top 10 female hackers. 1) Adenna Cooke: Most of the world recognizes Adeanna Cooke as an international model regularly featured in Playboy, but her fans are often surprised to hear that she is also a well-established hacker and amateur computer programmer. With very little in the way of training, Cooke
The world’s top 10 female hackers Read More »
Online identity theft is on the rise and it’s a serious threat. Online identity theft is not a new phenomenon to many Internet users. However, today, the Internet has given it a new lease of life. Every minute, thousands of individuals and even companies fall prey to these increasingly sophisticated cybercriminals and attackers. They use
Online Identity theft Read More »
The new trojan, known as Ratsnif, is used by OceanLotus, a known cybercriminal ring linked to Vietnam’s espionage efforts. Also known as APT32, CobaltKitty, SeaLotus, and APT-C-00 in the infosec community, the hackers typically combine unique malware with commercially-available tools, like Cobalt Strike.Ratsnif is a remote access trojan used in cyber-espionage campaigns from the OceanLotus
Magecart is a form of data skimming, which attacks using the client-side browser as the front-door for consumer interactions. “Skimming” is a method used by attackers to capture sensitive information from online payment forms, such as email addresses, passwords, and credit card numbers. For Magecart specifically, hackers implant malicious code into websites in order to
Magecart Skimming Attacks Read More »