iphone is hacked

How to Check if Your iPhone is Hacked?

23rd March 2023, Kathmandu iPhones have become an essential aspect of our daily lives. We use them for important activities like shopping online and storing private data. With features like Apple Pay,...
India Data Breach Saga

India Data Breach Saga Continues; Country’s Second Largest Stockbroker, Upstox, Hit

15th April 2021, Kathmandu Upstox, India’s second-largest stockbroker in terms of a number of customers was hit by a cyberattack. Contact data and KYC details of 25 lakh of its customers were...
Bugs in DNS Services

Bugs in Managed DNS Services Cloud Let Attackers Spy on DNS Traffic

12th August 2021, Kathmandu Cybersecurity researchers have disclosed an incipient class of susceptibilities impacting major DNS-as-a-Accommodation (DNSaaS) providers that could sanction assailers to exfiltrate sensitive information from corporate networks. "We found a simple...
Monetize Malware

Cybercriminals Abusing Internet-Sharing Services to Monetize Malware Campaigns

3rd September 2021, Kathmandu Threat actors are capitalizing on the growing popularity of proxy war platforms like Honeygain and Nanowire to monetize their own malware campaigns, once again illustrating how assailants are...
cybersecurity in financial services panel

Cybersecurity Conference In Kuala Lumpur City Centre Malaysia

22nd May 2023, Kathmandu CyberSecMalaysia Conference 2023 is organizing the theme of Strengthening Cybersecurity Landscape in Malaysia Emerging Technologies for Cybersecurity in 2023 at Pullman Kuala Lumpur City Centre, Malaysia. CyberSecMalaysia Conference is...
ToxicEye Malware

Telegram Platform Abused in ‘ToxicEye’ Malware Campaigns

23rd April 2021, Kathmandu Hackers are leveraging the popular Telegram messaging app by embedding its code inside a remote access trojan (RAT) dubbed ToxicEye, new research has found. A victim’s computer infected...
Ransomware Hackers

Ransomware Hackers Who Assailed Over 100 Companies Apprehended in Ukraine

10th October 2021, Kathmandu Law enforcement agencies have promulgated the apprehend of two "prolific ransomware operators" in Ukraine who allegedly conducted a string of targeted attacks against astronomically immense industrial entities in...
Connection in Nepal

How Can We Secure Our Internet Connection in Nepal?

16 March 2021, Kathmandu A few days ago, on the 30th of November, we celebrated World Computer Security Day. On this occasion, best practices in cybersecurity have been promoted around the world...
Unpatched Windows Printer Spooler

Another Unpatched Windows Printer Spooler Bug Discovered

20th July 2021, Kathmandu After days, Microsoft was notified of an unpatched security vulnerability in the Windows Print Spooler service, yet another 0-day flaw has been identified in the same component. Researcher Benjamin...
EC-Council Certification Exams

CEH and Four Other EC-Council Certification Exams Earn College Credit

25th April 2021, Kathmandu EC-Council is pleased to announce five certifications that recently received approval from the American Council on Education (ACE). This is a major step to help jump-start college careers as well as...
Facebook account gets hacked

APF’s Facebook Page Hacked By Unknown Group

15th April 2023, Kathmandu Armed Police Force's Facebook page has been hacked." The official Facebook page of the Armed Police Force has been hacked. On Tuesday morning, Assistant Spokesperson DSP Shailendra Thapa of...
CODESYS Industrial Automation Software

Many Critical Issues Newly Discovered in CODESYS Industrial Automation Software

21 July 2021, Kathmandu Cybersecurity researchers on Wednesday disclosed multiple security vulnerabilities affecting the CODESYS automation software and the WAGO Programmable Logic Controller (PLC) platform. These vulnerabilities can be remotely exploited to...
trend-micro-cloud-security

Trend Micro Predicts Cloud Security Will Be Consumed by the SOC by 2026

13th June 2023, Kathmandu Trend Micro, a global cybersecurity leader, predicts the security operation center (SOC) within organizations will absorb cloud security by 2026. Security leaders are recognizing that the cloud and the...
Ransomware Resiliency

Ransomware Vulnerabilities That Could Bring Down Your Organization

6th September 2021, Kathmandu Today, 266 susceptibilities are associated with ransomware, and assailers are increasingly exploiting these impuissances to launch devastating ransomware attacks. Ergo, identifying and remediating these susceptibilities needs to be...
Global Cybersecurity Meeting

White House to Host Global Cybersecurity Meeting with 30 Countries

6th October 2021, Kathmandu Cybersecurity keeps on being a developing concern, and ransomware assaults have arisen as a public danger to associations, influencing basic frameworks and making extreme harm to clients and...
Windows Print Nightmare Bug

CISA Shares Mitigations for Windows Print Nightmare Bug

7th July 2021, Kathmandu Microsoft has published mitigation guidance to block attacks on systems vulnerable to exploits setting Audience the windows print spoiler. Remote Coe execution bug impacts all the windows, the company...
Ransomware Attackers

Ransomware Attackers Bypass Security Detection Using VMs

30th July 2021, Kathmandu Some ransomware attackers have used virtual machines to evade security detection, yet acquisition is slow-going for the complicated technique. Another ransomware group using Virtual machines (VMs) to evade defensive...
WhatsApp India Privacy Policy

How to Move WhatsApp Chats from an iPhone to an Android Phone?

10th November 2021, Kathmandu Transferring WhatsApp chats from an iPhone to an Android phone is a simple process that should only take a few minutes. When switching phones, your chat history is one...
Cloud Security Usability

Cloud Security Usability to Skyrocket with New Trend Micro Innovation

7th December 2022, Kathmandu Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, announced a new protection deployment model that delivers excellent value to security and development teams. Unlike competitors, Trend...
Eight Malicious URL-Hijacking

Eight Malicious URL-Hijacking Python Libraries Discovered on PyPI Repository

1st August 2021, Kathmandu PyPI gateway has deleted the eight Python packages that were installed more than 30,000 times for having malicious code, which is once again highlighting how software package repositories...
Darknet

Covid-19 Patient’s Health Data Being Sold on the Dark Web

21st May 2021, Kathmandu Some cybersecurity researchers have unearthed personal medical details and records of patients who were up for sale on the dark web. Investigators say they have seen a "sharp increase"...
Russian Turla APT Group

Russian Turla APT Group Deploying Incipient Backdoor on Targeted Systems

29th September 2021, Kathmandu State-sponsored hackers affiliated with Russia are abaft an incipient series of intrusions utilizing an aforetime undocumented implant to compromise systems in the U.S., Germany, and Afghanistan. Cisco Talos attributed...
Carnival Cruise Line

Carnival Cruise Line Hacked Second Time in Two Years

23 June 2021, Kathmandu Carnival Cruise Line has been hacked for Second Time in a couple of years. Generally, Carnival Cruise Line is an international cruise line. Its headquarters is in Doral, Florida. It is one of...
Phishing-Threats

Phishing Attacks Carried out using Chipotle’s Marketing Account

1st August 2021, Kathmandu Customers' payment card data was stolen by hackers using malware planted at the great majority of Chipotle Mexican Grill's more than 2,000 locations, according to the restaurant business. The...
Digital Forensics in Emerging Technologies

Implementing Digital Forensics in Emerging Technologies

10th October 2021, Kathmandu Technology is advancing at an amazing rate and keeping in mind that at it, it is likewise associating the computerized world in a manner never seen. The execution of...
Global Cybersecurity Meeting

SonicWall Cyber Threat Report Casts New Light on Shifting Front Lines

1st March 2023, Kathmandu SonicWall, publisher of the world's most quoted ransomware data and trusted cyberattack intelligence, today released the 2023 SonicWall Cyber Threat Report. The bi-annual report details an increasingly diversified cyberattack...
Swarmshop Hacked

Hackers Taste Bitterness Of Their Medicine, Darknet MarketPlace Swarmshop Hacked

11th April 2021,  Kathmandu Until recently, the carding store Swarmshop was a popular, illicit online market where cybercriminals could go to sell and purchase stolen credit cards and banking data. However, the...
Fleeceware Apps

Fleeceware Apps Continue to Deceit Consumers; Scammers Earn $400 Million

9th April 2021, Kathmandu Scammers have discovered a new cyber path of earning. An estimated $400 million by distributing fleeceware applications on Google Play and Apple App Store. We all have heard it's...
Cisco Critical Fixes

Cisco Issues Critical Fixes for High-End Nexus Gear

28th August 2021, Kathmandu Networking giant issues two critical patches and six high-rigor patches. Cisco Systems relinquished six security patches tied to its high-end 9000 series networking gear ranging in paramountcy from critical,...

IT Entrepreneur Rudra Pandey’s Twitter Account Hacked

8th April 2023, Kathmandu The Twitter account of IT entrepreneur Rudra Pandey has been hacked. Pandey has posted on Facebook that his Twitter account has been hacked. "I have been hacked on my...