ডিসকর্ড কি এবং এটি কিভাবে কাজ করে?
ডিসকর্ড হল একটি বিনামূল্যে ভয়েস এবং টেক্সট চ্যাট ভিত্তিক অ্যাপ্লিকেশন যা স্কাইপ এবং টিমসপিকের মতো ভয়েস চ্যাট…
Alexa Ranking কি পুরোটাই ভাওতাবাজি?
কষ্টের কথা কি জানেন, অনেক মানুষ Alexa Ranking দেখে খুশিতে আত্মহারা হয়ে যান কোন কিছু না বুঝেই।…
US Sanctions Cryptocurrency Exchange SUEX for Aiding Ransomware Gangs
The U.S. Treasury Department on Tuesday imposed sanctions on Russian cryptocurrency exchange Suex for helping facilitate and…
New Tomiris Backdoor Found Linked to Hackers Behind SolarWinds Cyberattack
Cybersecurity researchers on Wednesday disclosed a previously undocumented backdoor likely designed and developed by the Nobelium advanced…
Iranian Hackers Abuse Dropbox in Cyberattacks Against Aerospace and Telecom Firms
Details have emerged about a new cyber espionage campaign directed against the aerospace and telecommunications industries, primarily…
New Study Links Seemingly Disparate Malware Attacks to Chinese Hackers
Chinese cyber espionage group APT41 has been linked to seemingly disparate malware campaigns, according to fresh research…
Researchers Warn of FontOnLake Rootkit Malware Targeting Linux Systems
Cybersecurity researchers have detailed a new campaign that likely targets entities in Southeast Asia with a previously…
Ransomware Group FIN12 Aggressively Going After Healthcare Targets
An “aggressive” financially motivated threat actor has been identified as linked to a string of RYUK ransomware…
Microsoft Warns of Iran-Linked Hackers Targeting US and Israeli Defense Firms
An emerging threat actor likely supporting Iranian national interests has been behind a password spraying campaign targeting…
Twitch Suffers Massive 125GB Data and Source Code Leak Due to Server Misconfiguration
Interactive livestreaming platform Twitch acknowledged a “breach” after an anonymous poster on the 4chan messaging board leaked its source…
Microsoft Exchange Bug Exposes ~100,000 Windows Domain Credentials
An unpatched design flaw in the implementation of Microsoft Exchange’s Autodiscover protocol has resulted in the leak…
Apple Pay Can be Abused to Make Contactless Payments From Locked iPhones
Cybersecurity researchers have disclosed an unpatched flaw in Apple Pay that attackers could abuse to make an…