Close
  • Home
  • Data Breaches
  • Cyberwarfare
  • Zero-Day
  • Avoid Attack
  • Cyber Attack
  • Webinars
  • Reward & Swags
Cyber Soochna

Cyber Soochna

The Fourth Pillar

Menu
    • Home
    • Data Breaches
    • Cyberwarfare
    • Zero-Day
    • Avoid Attack
    • Cyber Attack
    • Webinars
    • Reward & Swags
    Search

    Unauthorized Access to Switzerland-based ‘Hitachi Energy’ on Auction

    Attack Description : On a Russian cybercrime forum called XSS, a threat actor going by the name “TA Benneton” conducted…

    July 23, 2023
    • Share this post
    • Share this postClose sharing box
    • Unauthorized Access to Switzerland-based ‘Hitachi Energy’ on Auction
    • Twitter
    • Facebook
    • LinkedIn

    CL0P Adopts New Extortion Technique; Publishes Victim Data on Clearweb

    Attack description : The use of a clear web domain to publish links to download compromised data is a new…

    July 23, 2023
    • Share this post
    • Share this postClose sharing box
    • CL0P Adopts New Extortion Technique; Publishes Victim Data on Clearweb
    • Twitter
    • Facebook
    • LinkedIn

    Sextortion  through attending unknown WhatsApp video call

    Description: Participating in an unknown WhatsApp video call can potentially expose users to various cyber risks and privacy concerns. While…

    July 23, 2023
    • Share this post
    • Share this postClose sharing box
    • Sextortion  through attending unknown WhatsApp video call
    • Twitter
    • Facebook
    • LinkedIn

    Cyber attack on Microsoft

    https://portal.azure.com/ Attack description : Anonymous Sudan successfully attacked Microsoft . Anonymous Sudan  also shared one POC of successful 30 minutes…

    July 23, 2023
    • Share this post
    • Share this postClose sharing box
    • Cyber attack on Microsoft
    • Twitter
    • Facebook
    • LinkedIn

    CL0P Announces 9 More Victim Organizations

    Attack Description : On their leak site, the CL0P ransomware group asserted that they have targeted nine additional victim organizations.…

    July 23, 2023
    • Share this post
    • Share this postClose sharing box
    • CL0P Announces 9 More Victim Organizations
    • Twitter
    • Facebook
    • LinkedIn

    Cyber attack on Yedioth Ahronoth- Israel

    https://www.ynet.co.il/ Attack description : Anonymous Sudan successfully targeted Ynet  (https://www.ynet.co.il/). Anonymous Sudan  also shared one POC of successful 1 hour …

    July 20, 2023
    • Share this post
    • Share this postClose sharing box
    • Cyber attack on Yedioth Ahronoth- Israel
    • Twitter
    • Facebook
    • LinkedIn

    Hacking through Granting Texting Permissions to Apps

    Description: In our digital age, smartphones have become an integral part of our lives, providing us with a multitude of…

    July 20, 2023
    • Share this post
    • Share this postClose sharing box
    • Hacking through Granting Texting Permissions to Apps
    • Twitter
    • Facebook
    • LinkedIn

    Cyber attack on National Institute of Standards and Technology

    https://www.nist.gov Attack description : Anonymous Sudan successfully targeted National Institute of Standards and Technology(https://www.nist.gov). Anonymous Sudan  also shared one POC…

    July 19, 2023
    • Share this post
    • Share this postClose sharing box
    • Cyber attack on National Institute of Standards and Technology
    • Twitter
    • Facebook
    • LinkedIn

    University of Minnesota’s Legacy Data Warehouse Allegedly Compromised

    Attack Description : Disturbing reports have emerged regarding the alleged compromise of the Legacy Data Warehouse belonging to the University…

    July 19, 2023
    • Share this post
    • Share this postClose sharing box
    • University of Minnesota’s Legacy Data Warehouse Allegedly Compromised
    • Twitter
    • Facebook
    • LinkedIn

    Hacking through Mobile Calling Permissions : Impacts and Mitigations

    Description : Granting the Calling permission to apps gives them the capability to initiate phone calls on your behalf or…

    July 18, 2023
    • Share this post
    • Share this postClose sharing box
    • Hacking through Mobile Calling Permissions : Impacts and Mitigations
    • Twitter
    • Facebook
    • LinkedIn

    Posts navigation

    Previous page Page 1 … Page 7 Page 8 Page 9 … Page 20 Next page

    Recent Posts

    • Fisher Engineering Database Allegedly Stolen and Leaked
    • Beware of the Latest Phishing Attack Targeting Bosses: Fraudulent Money Requests
    • Critical Security Breach: Database Allegedly Stolen from Official Portal of Kedah State Government (Malaysia) Now for Sale
    • Major Security Breach: 1 Million Citizens’ Records Allegedly Stolen from Election Commission of Malaysia (MySPR) Offered for Sale
    • 3 Security Breach Alert: Database Allegedly Stolen from Criconet.com Leaked on BreachForums

    Stay Informed. Stay Secure. Download CyberSoochna App Today

    • Google Play Store
    • App Store
    • Terms & Conditions
    • Privacy Policy
    • Contact Us

    Copyright CyberSoochna All Rights Reserved.

    Follow Us At :

    scroll to top