Multi factor authentication and its Vulnerabilities
Multi-factor authentication (MFA) is a security process that requires users to provide two or more forms of identification before gaining access to a service or system. The idea behind MFA…
Hunt the Haunt
Multi-factor authentication (MFA) is a security process that requires users to provide two or more forms of identification before gaining access to a service or system. The idea behind MFA…
Recently security researchers found malicious actors exploiting old and recently disclosed Oracle Weblogic Server vulnerabilities to deliver the crypto miner malware on the infected hosts. Mostly the Oracle Weblogic Servers…
Security researchers analyzed the Samsung smartphones and found multiple critical vulnerabilities that can be exploited by the hackers using Pre-installed applications. As per the researchers, the vulnerabilities could exploit the…
Researchers from the Kaspersky Endpoint security firm have identified Zero-day exploit from Google’s Chrome browser and Microsoft windows zero-day exploits that have targeted multiple attacks on several enterprises. Now the…