Headlines
  • A shooting that took place early on Sunday on a pedestrian promenade near to the University of Iowa campus in downtown Iowa City injured at least three students.
  • After issuing warnings, Iranian forces turned back two tankers that were trying to pass through the Strait of Hormuz, citing the ongoing US maritime blockade as the reason.
  • Iran claimed that since the war with the US and Israel started on February 28, over 3,400 people had died.
  • On Saturday night, the Islamic Revolutionary Guard Corps (IRGC) of Iran threatened to strike any ship that approached the Strait of Hormuz.
  • India's Ministry of External Affairs called the Iranian ambassador to India to discuss the "serious incident" involving two Indian-flagged ships that were fired upon on Saturday in the Strait of Hormuz.
  • Iran said that it is examining fresh U.S. proposals that were communicated through Pakistan's mediators, but it has not yet responded.
  • Hezbollah leader Naim Qassem vowed on Saturday that his fighters would retaliate against Israeli attacks on Lebanon and stated that the current 10-day ceasefire with Israel cannot be one-sided.

Tag: Cyber Attack

March 18, 2026

Computer Network Exploitation (CNE)

Infiltrating and exploiting computer networks, systems, or devices for cyberattacks or espionage is known as computer network exploitation (CNE).

March 17, 2026

Identity Based Attacks

Identity-based attacks are cyber threats that use a person’s or organization’s identity to obtain sensitive data without authorization. These attacks often target corporate or personal data, resulting in data breaches and large financial losses.

March 16, 2026

Demilitarized Zone (DMZ)

A perimeter network known as a demilitarized zone, or DMZ, shields an organization’s internal local area network from unauthorized traffic.

March 13, 2026

DNS Data Exfiltration Attack

DNS data exfiltration is an attack tactic that uses DNS queries and responses to surreptitiously remove sensitive data from a network.

March 12, 2026

Baiting How to Protect Your Devices

A type of social engineering known as “baiting” involves the attacker luring the victim with tempting offers or incentives. This strategy deceives the target into unintentionally installing malware on their computer or divulging important data, compromising credentials, or transferring funds.

March 11, 2026

Clickjacking How to Prevent

A type of attack known as “clickjacking” happens when the victim clicks on links on a website they think is reputable and reliable. The victim is unaware that they are clicking on a malicious, hidden website that is superimposed over the reputable website.

March 10, 2026

Crypters

The primary objective of software known as “crypters” is of altering a target binary in order to evade detection by antivirus program.

March 9, 2026

Deep Web

Conventional web browsers cannot access the deep web because it is not indexed.The deep web is safe and exists to safeguard user data and privacy.

March 6, 2026

Fileless Malware

A type of malicious software known as “fileless malware” infects a computer by using reliable apps. As it doesn’t rely on files and leaves no trace, it is difficult to detect and remove.

March 5, 2026

Process Hollowing

Using the covert malware injection technique known as “process hollowing,” an attacker suspends a legitimate process, removes its original code, and replaces it with malicious code before the process resumes. Due to this, the virus can operate as a legitimate process and avoid being discovered by security programs.

Top