TechJuice > Cyber Attack
The National Computer Emergency Response Team (nCERT) has issued a safety advisory to WhatsApp users in Pakistan due to an increase in cyber threats to…
In a recent advisory, a nation’s cabinet division has issued an advisory against 133 malicious applications created by hostile intelligence agencies to steal information. According…
Cybercrime: Hackers have stolen nearly 10TB of data from a data storage leader that contains customer information. Western Digital has taken its store offline and…
Indian Hacking Groups are involved in the cyber crimes in Pakistan and Afghanistan. Data collected from different sources reveals that the group wants to steal…
The United States of America has reportedly fallen prey to a cyber attack of serious proportions in recent weeks. While the extent of the breach…
The Biden administration issued sanctions against six Russian technology companies for helping Russia carry out malicious cyber activities, including the SolarWinds hack, by providing expertise,…
Thousands of cyberattacks continue to target zero-day security vulnerabilities in Microsoft Exchange Servers as cybercriminals attempt to target organizations that have yet to apply the…
Verkada – a Silicon Valley-based startup providing cloud-based security camera services, has undergone a major security breach, with hackers gaining access to 150,000 of the…
According to a security firm, a Chinese hacking group has attacked two Indian vaccine manufacturers. Cyfirma, which is based in Singapore and Tokyo, has found…
In the 43rd board meeting of Benazir Income Support Program (BISP) at the BISP headquarters under the chair of the Special Assistant to the Prime…
According to recent research, the authenticator app by Google for Android is susceptible to major malware known as Cerberus. As per the cybersecurity specialist ThreatFabric,…
In a move that can only be considered as a continuation of the on-going tension between the USA and Iran, a group of individuals proclaiming…
We have covered top 3 free cybersecurity courses earlier and now we will move on to another sub-field of Information Security which is Digital Forensics.…