Hacking Microsoft teams by simply using a GIF image
As the use of video conferencing platforms for home work increases, the battle between big tech companies continues to seek to seize a market that was badly exploited before theRead More →
As the use of video conferencing platforms for home work increases, the battle between big tech companies continues to seek to seize a market that was badly exploited before theRead More →
One of the most notable behaviors during the weeks of social estrangement and work from home has been the use of remote communication tools, such as the Zoom video conferencingRead More →
Recently, hundreds of Nintendo console users reported various signs of suspicious activity on their accounts through social media. According to network perimeter security experts, these alleged attackers entered users’ accountsRead More →
A few days ago, multiple technology companies, such as Google, SpaceX, and even NASA banned their employees from using Zoom as a tool for remote work due to multiple reportsRead More →
Security risks are becoming more complex. Specialists from a Tenable firm’s cyber security course have revealed the discovery of multiple vulnerabilities in Crestron AM-100, which shares source code with manyRead More →
Specialists from a hacking course and members of the computer science department at an Israeli university have published research detailing the use of computer-installed fans to generate controlled vibrations forRead More →
Cloud computing security service specialists have revealed a report of a vulnerability in VMWre vCenter v6.7 software. Tracked as CVE-2020-3952, this flaw is caused by inadequate access controls on theRead More →
A new security inconvenience for people working from home has been reported. Information security training experts report that nearly half a million Zoom accounts are on sale on various hackingRead More →
While technological advances help facilitate some everyday activities, they can also be used by hackers to expose people to new variants of cyberattacks. Cloud security course specialists published research inRead More →
Although some industries are partially operating, threat actors do not miss the opportunity to generate havoc. According to specialists in a hacking course, a group of cybercriminals successfully managed toRead More →