Australia Sued Facebook For Privacy Breach of 311,121 Australians
Ever since the case of Cambridge Analytica broke out, Facebook was accused of leveraging its platform for improper uses. This attracted the social media...
OneTone WordPress Theme is Vulnerable To Backdoor Hacks
Sucuri cybersecurity says a theme in WordPress called OneTone has actively been exploited by hackers. The theme makers, Magee WP have not responded to...
GitHub and GitLab OAuth Tokens Stolen by Hackers to Gain Unauthorised Access
Unknown hackers have stolen OAuth tokens of GitHub and GitLab, from Waydev, Dave.com, and Flood.io to gain unauthorized access to their customers' codebases. GitHub...
IObit Forum Hacked For Distributing DeroHE Ransomware
IObit, a utility software maker for the Windows OS has its forum hacked. This malicious access was used by threat actors to distribute their...
Nobel Foundation Disclosed a DDoS Attack on its Virtual Ceremony
Nobel Foundation and the Norwegian Nobel Institute, have disclosed a cyberattack on their infrastructure, aimed at disrupting the live stream of the award ceremony...
“BIRD” Portal gets Shut down by ECB after Hackers Breach Through
The European Central Bank (ECB) raised an alert that a massive hacking attack has been underway which caused a lot of damage. The hackers...
10 Years Old are Hacking our Voting System Stated by Hillary Clinton, No Tight...
In the current days, Hillary Clinton has been thought for the theories of system and proposal. There are not a single but several things...
Hackers Breach into Helix IPTV: Threaten to Leak Customer’s Data
Pirate IPTV streaming providers "Helix" is currently in a bug fix as a data leak seems imminent. According to sources, Helix's website was hacked...
Telegram is Used to Steal Cryptocurrencies By North Korean Hacker Group Lazarus
Lazarus, a popular hacker group believed to be backed by North Korea, is continuously upgrading itself to find new ways of stealing cryptocurrencies. As...
Malware Based Android Cleaner Apps That Can Breach Into Your Phone
Some malicious android applications can ruin your device's security features, and personal access files claim an internet security website. According to Trend Micro, the...