Daily Archives: May 8, 2019

Remember those stolen ‘NSA exploits’ leaked online by the Shadow Brokers? The Chinese had them a year before

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Months before top-tier hacking tools, likely built by the NSA, were leaked to the public by a group calling itself the Shadow Brokers, the exploit code was apparently being used by Chinese state hackers to infiltrate systems.

This is according […]

By |May 8th, 2019|Cyber News|

Be wary of emails with links to … er, Google Drive? Is that right?

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

Spammers are increasingly turning to common file-sharing and object storage services such as Google Drive and Microsoft Azure, in an attempt to evade ever-better corporate filters.

“Embedding links to trusted services helps attackers bypass traditional content filters, such as spam […]

By |May 8th, 2019|Cyber News|

‘Software delivered to Boeing’ now blamed for 737 MAX warning fiasco

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

As the 737 MAX scandal rolls on, “software delivered to Boeing” has been blamed by the company for the malfunctioning of a safety display.

In a statement issued over the weekend, the American airliner manufacturer admitted that its software was not properly […]

By |May 8th, 2019|Cyber News|

Feds nab top exec on allegations he hacked a competitor, stole info… about school lunches?!

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India

Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan

Credits: The Register

After a year-long investigation, a top California exec has been arrested by the FBI for allegedly hacking into a competitor’s website and stealing their customer data in an effort to ruin their business.

There is an unusual twist, however: this […]

By |May 8th, 2019|Cyber News|