How Bug Bounty Programs Helped Secure Some of the World’s leading Track
17th April 2021, Kathmandu
Covid-19 pandemic: How bug bounty programs helped secure some of the world’s leading track and trace apps
Began covid 19 pandemics across the globe in 2020, governments worldwide raced...
Facebook data leak: A Fresh Phone Number Database is there online, claims report
16th April 2021, Kathmandu
The news of the Facebook data leak that compromised the phone numbers and email IDs of over 500 million users has not even died yet and now there is another...
Google Will Warn You Not to Look at Your Phone While Walking
16th April 2021, Kathmandu
At times people are so engrossed in their phones while walking outside, it’s better if their phones themselves told them that they should not be doing so.
This might...
Another Israeli Cyber Sabotage Attempt on Iran’s Natanz Nuclear Facility
16th April 2021, Kathmandu
A nuclear facility in Iran was hit by "sabotage" a day after it unveiled new uranium enrichment equipment, the country's top nuclear official says.
The internal power system at...
U.K. NCSC Urges Brits to Avoid Pet’s Names as Passwords
16th April 2021, Kathmandu
One cannot ignore the importance of a strong password while improving security online. Using hard-to-guess passwords or passphrases provide optimum security to your devices and online accounts. However,...
Cobalt Application Security Platform, Pentest as a Service
16th April 2021, Kathmandu
Cobalt, a Pentest as a Service (PtaaS) platform that simplifies the security and compliance needs of DevOps-driven teams with workflow integrations and high-quality talent on-demand. Cobalt offers a...
India Data Breach Saga Continues; Country’s Second Largest Stockbroker, Upstox, Hit
15th April 2021, Kathmandu
Upstox, India’s second-largest stockbroker in terms of a number of customers was hit by a cyberattack. Contact data and KYC details of 25 lakh of its customers were...
Global Cyber Attacks Originate from China. Is Beijing the Ultimate Virtual-threat Plotter?
13th April 2021, Kathmandu
30% of Global Cyber Attacks Originate from China. Is Beijing the Ultimate Virtual-threat Plotter?
China is using its state-sponsored cyber-attacks mostly as ‘cyber psyops’ to target rivals’ defense, economic...
Security Startup Verkada’s Surveillance Cameras at Tesla
13th April 2021, Kathmandu
Security Startup Verkada's Surveillance Cameras at Tesla, Hundreds of More Businesses Breached
A small group of hackers viewed live and archived surveillance footage from hundreds of businesses including Tesla...
After FB, LinkedIn Now Faces Massive 500 mn Users’ Data Leak
13th March 2021, Kathmandu
According to a report by CyberNews, the potential scope of the leak is huge and an individual selling the data on a hacker forum claims it was scraped...
Alert – There’s a New Malware Out There Snatching Users’ Passwords
13th April 2021, Kathmandu
A previously undocumented malware downloader has been spotted in the wild in phishing attacks to deploy credential stealers and other malicious payloads.
Dubbed “Saint Bot,” the malware is said...
Driving Sustainable Improvement for Medical Device Quality
13th April 2021, Kathmandu
ISACA, in collaboration with the Medical Device Innovation Consortium, the US Food and Drug Administration (FDA), and industry stakeholders, has developed the Case for Quality Voluntary Improvement Program...
Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2own 2021
13th April 2021, Kathmandu
The Spring 2021 edition of the Pwn2Own hacking contest ended last week on April 8 with a three-way tie between researchers from Team Dev core, OV and Computes,...
Hackers Tampered With APKPure Store to Distribute Malware Apps
13 April 2021, Kathmandu
APKPure, one of the largest alternative app stores outside of the Google Play Store, was infected with malware this week, allowing threat actors to distribute Trojans to Android...
Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks
11th April 2021, Kathmandu
Industrial enterprises successful Europe are people of campaign, which forced a shutdown of concern processes successful astatine slightest 1 of its victims’ networks, according to researchers.
Threat actors are...
Fake Netflix App on Google Play Spreads Malware via Whatsapp
11th April 2021, Kathmandu
A fake application on google play, claiming to allow users to view Netflix content from all over the world, was spreading malware through WhatsApp messages, according to researchers...
Stolen Data of 533 Million Facebook Users Leaked Online
11th March 2021, Kathmandu
A collection of information on more than 530 million users was shared over the weekend on a hacker forum, prompting the leading social network to explain what happened...
Companies Can Find the “X” Factor For Cybersecurity Compliance
11th April 2021, Kathmandu
Cybersecurity threat, a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service...
Hackers Taste Bitterness Of Their Medicine, Darknet MarketPlace Swarmshop Hacked
11th April 2021, Kathmandu
Until recently, the carding store Swarmshop was a popular, illicit online market where cybercriminals could go to sell and purchase stolen credit cards and banking data. However, the...
Cybercrime Group Lazarus Upgrades Its Arsenal With VYVEVA Malware
11th April 2021, Kathmandu
Lazarus Group is a cybercrime group made up of an unknown number of individuals. The United States Federal Bureau of Investigation says that the Lazarus Group is a...
Adware Increase Over Fake Tiktok App, Laptop Offer
10th April 2021, Kathmandu
Malicious Android apps disguised as TikTok and offers for free Lenovo laptops are being used in ad-stuffing attacks underway against devices on the Jio telecom network in India,...
Gigaset Android Phones Infected By Malware By Hacked Update Server
10th April 2021, Kathmandu
Gigaset, a German multinational company well known in the area of communication revealed to have a malware infection in their android phones. Owners of Gigaset android phones have...
Fleeceware Apps Continue to Deceit Consumers; Scammers Earn $400 Million
9th April 2021, Kathmandu
Scammers have discovered a new cyber path of earning. An estimated $400 million by distributing fleeceware applications on Google Play and Apple App Store.
We all have heard it's...
Robinhood Warns Customers of Tax-Season Phishing Scams
9th April 2021, Kathmandu
Attackers targeted customers in two ways, according to the email. One attack vector used phishing emails with links to fake Robinhood websites prompting visitors to enter their login...
Instagram Has a New Plan to Strengthen its Anti-bullying Feature
8th April 2021, Kathmandu
Instagram – a social media platform that is preparing to launch a new feature that will strengthen its anti-bullying feature.
These new features may be an AI device. This...
Cybercriminals Make Twitter a Playing Field to Target Indonesian Banks
6th April 2021, Kathmandu
In recent years, cyberattacks have been increasing day by day. Nowadays, Cybercriminals have placed more pressure on the financial sector. A recent study shows that 65 % of...
Garima Development Bank Launches ‘Be Careful’ Campaign
30 March 2021, Kathmandu
The threat from cybercriminals has increased drastically in Nepal. Just the other day, Deepa Shree Niraula and Saroj Khanal’s Facebook Account has been hacked.
Garima Development Bank has launched...
Deepa Shree Niraula and Saroj Khanal’s Facebook Account Hacked
26 March 2021, Kathmandu
Lots of cyberattacks have been happening in Nepal lately. Attacks like phishing, account hack are being common nowadays in Nepal. Someday phishing attacks happen on the name of...
NTA to Establish Cyber Security Simulation Lab for Telecom Industry
20 March 2021, Kathmandu
Nepal Telecommunication Authority (NTA) is about to establish Cyber Security Lab
Cyber Security is a field of information technology. It involved the safety and security concerns of computer systems...
Security Researcher hides ZIP, MP3 Files inside PNG Files on Twitter
20 March 2021, Kathmandu
A security researcher discovered a novel Steganography Method for hiding up to three MB of data within a Portable Network Graphics (.PNG) image file posted on Twitter.
David Buchanan,...