Email:

Phone No.

Whatsapp

Blog

New Gummy Browsers Attack Lets Hackers Spoof Tracking Profiles
New Gummy Browsers Attack Lets Hackers Spoof Tracking Profiles
New Gummy Browsers Attack Lets Hackers Spoof Tracking Profiles
New Gummy Browsers Attack Lets Hackers Spoof Tracking Profiles

New Gummy Browsers Attack Lets Hackers Spoof Tracking Profiles

New Gummy Browsers Attack Lets Hackers Spoof Tracking Profiles University researchers in the US have developed a new fingerprint capturing and browser spoofing attack called Gummy Browsers. They warn how easy the attack is to carry out and the severe implications it can have. A digital fingerprint is a unique online identifier associated with a

Microsoft 365 Will Get Enhanced Insider Risk Management Tools

Microsoft 365 Will Get Enhanced Insider Risk Management Tools Microsoft is updating Microsoft 365 to allow admins to better manage insider security threats in their environments with improvements to risky activity detection and visibility. Insider Risk Management enables Microsoft 365 cloud services platform customers to detect, investigate, and remediate insider security threats within their organizations across Office, Windows,

New PurpleFox Botnet Variant Uses WebSockets For C2 Communication

New PurpleFox Botnet Variant Uses WebSockets For C2 Communication The PurpleFox botnet has refreshed its arsenal with new vulnerability exploits and dropped payloads, now also leveraging WebSockets for C2 bidirectional communication. Although it’s mainly based in China, the PurpleFox botnet still has a global presence through hundreds of compromised servers. Its activity starts with the execution of

Zerodium Wants Zero-day Exploits For Windows VPN Clients

Zerodium Wants Zero-day Exploits For Windows VPN Clients In a short tweet today, exploit broker Zerodium said that it is looking to acquire zero-day exploits for vulnerabilities in three popular virtual private network (VPN) service providers on the market. VPN services allow you to hide your IP address when accessing resources on the internet by

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us