Close
  • Home
  • Data Breaches
  • Cyberwarfare
  • Zero-Day
  • Avoid Attack
  • Cyber Attack
  • Webinars
  • Reward & Swags
Cyber Soochna

Cyber Soochna

The Fourth Pillar

Menu
    • Home
    • Data Breaches
    • Cyberwarfare
    • Zero-Day
    • Avoid Attack
    • Cyber Attack
    • Webinars
    • Reward & Swags
    Search
    1. Home
    2. Avoid Attack

    Beware of the Latest Phishing Attack Targeting Bosses: Fraudulent Money Requests

    Description: In the ever-evolving landscape of cybersecurity threats, phishing attacks continue to pose a significant risk to individuals and organizations…

    November 27, 2023
    • Share this post
    • Share this postClose sharing box
    • Beware of the Latest Phishing Attack Targeting Bosses: Fraudulent Money Requests
    • Twitter
    • Facebook
    • LinkedIn

    Hacking through Granting Storage permission to Apps

    Description: The “Storage” permission on a mobile device allows apps to access files stored on the device’s internal storage or…

    July 23, 2023
    • Share this post
    • Share this postClose sharing box
    • Hacking through Granting Storage permission to Apps
    • Twitter
    • Facebook
    • LinkedIn

    YouTube like scam (India and worldwide)

    Description: The “YouTube like scam” is a type of social engineering scam that typically targets mobile users through text messages.…

    July 23, 2023
    • Share this post
    • Share this postClose sharing box
    • YouTube like scam (India and worldwide)
    • Twitter
    • Facebook
    • LinkedIn

    Sextortion  through attending unknown WhatsApp video call

    Description: Participating in an unknown WhatsApp video call can potentially expose users to various cyber risks and privacy concerns. While…

    July 23, 2023
    • Share this post
    • Share this postClose sharing box
    • Sextortion  through attending unknown WhatsApp video call
    • Twitter
    • Facebook
    • LinkedIn

    Hacking through Granting Texting Permissions to Apps

    Description: In our digital age, smartphones have become an integral part of our lives, providing us with a multitude of…

    July 20, 2023
    • Share this post
    • Share this postClose sharing box
    • Hacking through Granting Texting Permissions to Apps
    • Twitter
    • Facebook
    • LinkedIn

    Hacking through Mobile Calling Permissions : Impacts and Mitigations

    Description : Granting the Calling permission to apps gives them the capability to initiate phone calls on your behalf or…

    July 18, 2023
    • Share this post
    • Share this postClose sharing box
    • Hacking through Mobile Calling Permissions : Impacts and Mitigations
    • Twitter
    • Facebook
    • LinkedIn

    Hacking through Mobile Microphone Permissions : Impacts and Mitigations

    Description : Apps requesting the Microphone permission can record audio using your device’s microphone. This permission grants the app the…

    July 18, 2023
    • Share this post
    • Share this postClose sharing box
    • Hacking through Mobile Microphone Permissions : Impacts and Mitigations
    • Twitter
    • Facebook
    • LinkedIn

    Hacking through Mobile GPS Location Permissions : Impacts and Mitigations

    Description : Granting access to GPS Location allows apps to determine your precise geographic location using your device’s GPS receiver.…

    July 15, 2023
    • Share this post
    • Share this postClose sharing box
    • Hacking through Mobile GPS Location Permissions : Impacts and Mitigations
    • Twitter
    • Facebook
    • LinkedIn

    Hacking through Mobile Camera Permissions : Impacts and Mitigations

    The Contacts permission enables apps to access and manage your contact list. This permission allows apps to view, modify, or…

    July 14, 2023
    • Share this post
    • Share this postClose sharing box
    • Hacking through Mobile Camera Permissions : Impacts and Mitigations
    • Twitter
    • Facebook
    • LinkedIn

    Hacking through Mobile Camera Permissions : Impacts and Mitigations

    In an era dominated by smartphones and mobile apps, the camera has become a powerful tool for capturing moments, enabling…

    July 13, 2023
    • Share this post
    • Share this postClose sharing box
    • Hacking through Mobile Camera Permissions : Impacts and Mitigations
    • Twitter
    • Facebook
    • LinkedIn

    Posts navigation

    Page 1 Page 2 Page 3 Next page

    Recent Posts

    • Fisher Engineering Database Allegedly Stolen and Leaked
    • Beware of the Latest Phishing Attack Targeting Bosses: Fraudulent Money Requests
    • Critical Security Breach: Database Allegedly Stolen from Official Portal of Kedah State Government (Malaysia) Now for Sale
    • Major Security Breach: 1 Million Citizens’ Records Allegedly Stolen from Election Commission of Malaysia (MySPR) Offered for Sale
    • 3 Security Breach Alert: Database Allegedly Stolen from Criconet.com Leaked on BreachForums

    Stay Informed. Stay Secure. Download CyberSoochna App Today

    • Google Play Store
    • App Store
    • Terms & Conditions
    • Privacy Policy
    • Contact Us

    Copyright CyberSoochna All Rights Reserved.

    Follow Us At :

    scroll to top