CALL US

+91 9116117170

Blog

Rules of Bug Bounty

By Devashish Soni 0 Comment April 2, 2020

Targeting a Bug Bounty Program How long you target a program? “some hours or a night” if this is your answer Then That’s where you are doing everything wrong. Bug Hunting is Matter of Luck and Skill’s .Spending just a few hours on a program could be waste of time Because those bugs are mostly […]

Android Applications in Google Play Store Capitalize on Coronavirus Breakout

By Yash Kudal 0 Comment March 27, 2020

The continuing coronavirus breakout is becoming an opportunity for attackers to introduce variety of  malware attacks, phishing, and build scam sites and malicious tracker applications. Now in a new trend, third-party Android app developers have started using this scenario to use coronavirus-related keywords in their application names, descriptions, or package names and to insert a […]

Unpatched Security Vulnerability Affects All Windows Versions

By Yash Kudal 0 Comment March 25, 2020

Microsoft released a new advisory for the safety of billions of Windows users on two critical, unpatched zero day flaw that could allow hackers to take full control of targeted computers. According to Microsoft, the unpatched vulnerabilities can affect all supported versions of the Windows operating system including Windows 10, 8.1 and Server 2008, 2012, […]

VMware Fixes Critical Vulnerability Affecting VMware Workstation Pro

By Yash Kudal 0 Comment March 21, 2020

VMware fixed Critical Vulnerability Reportedly, the vulnerability which was existed was targeting guest to host interaction. In particular, the bug allowed guest apps to issue commands to hosts. VMware emphasized that a critical vulnerability (CVE-2020-3947) exists in Workstation and Fusion. The vendors have claimed it a critical bug with a CVSS score of 9.3. The […]

Covidlock: A Tracking Application infecting Android Smartphones

By Yash Kudal 0 Comment March 20, 2020

Over the past few months, there are number of reports of hackers using the global COVID-19 pandemic to attack users to steal financial credentials and now in the latest trend, cyber criminals have launched a malicious coronovirus software application. When any user comes to the site, they will be asked to download the Android app. […]

error: Content is protected by Cyberops !!