CALL US

+91 9116117170

Blog

Unpatched Security Vulnerability Affects All Windows Versions

By Yash Kudal 0 Comment March 25, 2020

Microsoft released a new advisory for the safety of billions of Windows users on two critical, unpatched zero day flaw that could allow hackers to take full control of targeted computers. According to Microsoft, the unpatched vulnerabilities can affect all supported versions of the Windows operating system including Windows 10, 8.1 and Server 2008, 2012, […]

VMware Fixes Critical Vulnerability Affecting VMware Workstation Pro

By Yash Kudal 0 Comment March 21, 2020

VMware fixed Critical Vulnerability Reportedly, the vulnerability which was existed was targeting guest to host interaction. In particular, the bug allowed guest apps to issue commands to hosts. VMware emphasized that a critical vulnerability (CVE-2020-3947) exists in Workstation and Fusion. The vendors have claimed it a critical bug with a CVSS score of 9.3. The […]

Covidlock: A Tracking Application infecting Android Smartphones

By Yash Kudal 0 Comment March 20, 2020

Over the past few months, there are number of reports of hackers using the global COVID-19 pandemic to attack users to steal financial credentials and now in the latest trend, cyber criminals have launched a malicious coronovirus software application. When any user comes to the site, they will be asked to download the Android app. […]

New Strain of Ransomware dubbed PXJ discovered

By Aneesh A S 0 Comment March 19, 2020

Researchers from IBM X-Force warn of a new malware strain called PXJ Ransomware which first emerged in early 2020. The new ransomware affecting Windows Operating Systems , behaves with common ransomware functions, though it does not appear to share the same underlying code with most other ransomware strains. The researchers spotted the ransomware for the […]

Google Hacking For Penetration Testers

By Devashish Soni 0 Comment March 19, 2020

Google hacking or Google dorking is an advance google search technique for information gathering. These search queries can be used to gather information for arbitrary or individual targets, identify security vulnerabilities in web applications, discover files containing credentials and other sensitive data, discover error messages disclosing sensitive information Before we Begin: Before we start what […]

error: Content is protected by Cyberops !!