Microsoft Exchange Server Flaw Let Remote Attackers Access Sensitive Information

ProxyToken, a serious security vulnerability has been detected in the Microsoft Exchange Server by the security analysts. ProxyToken vulnera...
Read More

Warning! Attackers Compromise Over 2000 Microsoft Exchange Servers With ProxyShell Flaws

Over the past two days, the hackers have compromised almost 2000 Microsoft Exchange servers and installed backdoors on those hacked 2000 Mic...
Read More

Top 10 Kubernetes Container Scanner to Detect Security Vulnerability and Misconfiguration

Before you read this topic, you may be wondering what Kubernetes is? Let us tell you; it is an extensible, portable, and open-source platfor...
Read More

WARNING: Microsoft Exchange Under Attack With ProxyShell Flaws

The U.S. Cybersecurity and Infrastructure Security Agency is warning of active exploitation attempts that leverage the latest line of "...
Read More

Largest HTTP DDoS Attack That Peaking At 17.2 Million Requests Per Second

Cloudflare stated that it mitigated a 17.2 million request-per-second (rps) DDoS attack, an attack about three times larger than any previou...
Read More

North Korean APT Hackers Attack Victims Using MS IE & Edge Browser Exploits

Researchers uncovered a new browser-based attackers from the infamous North Korean APT Hackers groups targeting the victims with the differe...
Read More

Critical Flaw Found in Older Cisco Small Business Routers Won't Be Fixed

A critical vulnerability in Cisco Small Business Routers will not be patched by the networking equipment giant, since the devices reached en...
Read More

Hackers Breached US Census Bureau in 2020 Using Citrix Exploit

According to the report published by the US Office of Inspector General (OIG), on January 11, 2020, the servers operated by the US Census Bu...
Read More

New HolesWarm Botnet Exploiting 20 Known Vulnerabilities To Attack Windows & Linux Servers

The cybersecurity researchers at Tencent Cloud Firewall have recently detected a new highly volatile botnet which is dubbed as HolesWarm.  T...
Read More

How Hackers Break Two-Factor Authentication Security By Intercepting SMS and Voice Calls

  The latest findings state that more than 80% of all hacking-related breaches happen due to compromised and weak credentials, with three bi...
Read More

What are Residential Proxies? – Pros & Cons

Proxy is an intermediate server of the Internet connection between the user and an Internet website. Such a connection scheme helps avoid th...
Read More

Information Security Magazine

Latest Cyber Hacking News