Even though Bluetooth is one of the most underrated features of modern-day mobile phones, yet seldom we find a phone that lacks this feature even today. Bluetooth is a short-range wireless connection feature that’s an integral element of modern-... Read more
Attackers generally use botnets to perform automated tasks such as attacking other systems or hijacking their resources for malicious purposes. However, in recent times we have seen some threat actors have altered its behavior. These altered ver... Read more
Systems and data are put at high risks of data and identity theft due to the misconfigurations of security controls. Recently, large enterprises have suffered data leaks as a result of misconfigurations in their infrastructure, and a hacker coll... Read more
A new backdoor malware is evading detection by a few security software and intrusion detection systems by using the DNS protocol to communicate with remote attackers. For ease of use and communication, a malware typically phones home to receive... Read more
Increasingly by the minute companies have turned to remote work as a precautionary measure for their employees, with the spread of Coronavirus, or COVID-19. With the focus on balancing business productivity with the health and safety of their wo... Read more