• Internal
  • External
  • Cyber
  • Defense
  • Science and Tech
  • Space
  • Technology

Recent Posts

Europe and China Take Step to Resolve Dispute on Electric Vehicles

IndianCyberDefender
January 12, 2026

Moment skier and dog swept along by avalanche

IndianCyberDefender
January 12, 2026

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

IndianCyberDefender
January 12, 2026

Burna Boy, Shallipopi and Rema win as Nigerian stars dominate

IndianCyberDefender
January 12, 2026
  • Home
  • Category
  • Cyber

Category : Cyber

Microsoft’s Top Execs’ Emails Breached in Sophisticated Russia-Linked APT Attack

Microsoft’s Top Execs’ Emails Breached in Sophisticated Russia-Linked APT Attack

Jan 20, 2024NewsroomCyber Espionage / Emails Security Microsoft on Friday revealed that it was the target of a nation-state attack

By IndianCyberDefender
January 21, 2024
CISA Issues Emergency Directive to Federal Agencies on Ivanti Zero-Day Exploits

CISA Issues Emergency Directive to Federal Agencies on Ivanti Zero-Day Exploits

Jan 20, 2024NewsroomNetwork Security / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an emergency

By IndianCyberDefender
January 21, 2024
Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years

Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years

Jan 20, 2024NewsroomZero Day / Cyber Espionage An advanced China-nexus cyber espionage group previously linked to the exploitation of security

By IndianCyberDefender
January 20, 2024
Canadian Man Stuck in Triangle of E-Commerce Fraud – Krebs on Security

Canadian Man Stuck in Triangle of E-Commerce Fraud – Krebs on Security

A Canadian man who says he’s been falsely charged with orchestrating a complex e-commerce scam is seeking to clear his

By IndianCyberDefender
January 20, 2024
Backup and Recovery Strategies for Exchange Server Administrators

Backup and Recovery Strategies for Exchange Server Administrators

In the current digital landscape, data has emerged as a crucial asset for organizations, akin to currency. It’s the lifeblood

By IndianCyberDefender
January 19, 2024
New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

Jan 18, 2024NewsroomServer Security / Cryptocurrency Vulnerable Docker services are being targeted by a novel campaign in which the threat

By IndianCyberDefender
January 18, 2024
PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft

PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft

Jan 18, 2024NewsroomFirmware Security / Vulnerability Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an

By IndianCyberDefender
January 18, 2024
E-Crime Rapper ‘Punchmade Dev’ Debuts Card Shop – Krebs on Security

E-Crime Rapper ‘Punchmade Dev’ Debuts Card Shop – Krebs on Security

The rapper and social media personality Punchmade Dev is perhaps best known for his flashy videos singing the praises of

By IndianCyberDefender
January 17, 2024
GitHub Rotates Keys After High-Severity Vulnerability Exposes Credentials

GitHub Rotates Keys After High-Severity Vulnerability Exposes Credentials

Jan 17, 2024NewsroomVulnerability / Software Security GitHub has revealed that it has rotated some keys in response to a security

By IndianCyberDefender
January 17, 2024
Alert: Over 178,000 SonicWall Firewalls Potentially Vulnerable to Exploits

Alert: Over 178,000 SonicWall Firewalls Potentially Vulnerable to Exploits

Jan 16, 2024NewsroomVulnerability / Network Security Over 178,000 SonicWall firewalls exposed over the internet are exploitable to at least one

By IndianCyberDefender
January 16, 2024

  • 1
  • …
  • 43
  • 44
  • 45
  • …
  • 63

Recent Posts

  • Europe and China Take Step to Resolve Dispute on Electric Vehicles
  • Moment skier and dog swept along by avalanche
  • GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials
  • Burna Boy, Shallipopi and Rema win as Nigerian stars dominate
  • Iran Prepared for War but Ready to Negotiate With U.S., Foreign Minister Says

Recent Comments

No comments to show.

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023

Categories

  • Cyber
  • Defense
  • External
  • Internal
  • Miscellaneous
  • Politics
  • Science and Tech
  • Space
  • Suspended
  • Technology

Popular Posts

Europe and China Take Step to Resolve Dispute on Electric Vehicles

IndianCyberDefender
January 12, 2026

Moment skier and dog swept along by avalanche

IndianCyberDefender
January 12, 2026

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials

IndianCyberDefender
January 12, 2026

Burna Boy, Shallipopi and Rema win as Nigerian stars dominate

IndianCyberDefender
January 12, 2026

Indian Cyber Defender