Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Day: November 25, 2022

  • Home
  • 2022
  • November
  • 25
Millions of Whatsapp data leaked and for Sale

Millions of Whatsapp data leaked and for Sale

Threat actor are claiming they were selling a 2022 database of 487 million WhatsApp user mobile numbers. The dataset acontains WhatsApp user data from 84 countries. Threat actor claims there…
Posted by PravinKarthik November 25, 2022
Google Patches Eighth Chrome ZeroDay of 2022

Google Patches Eighth Chrome ZeroDay of 2022

Google has just patched eigth zero-day vulnerability in its Chrome browser. The vulnerability was caused by a heap buffer overflow in GPU, allowing attackers to modify the data stored in…
Posted by PravinKarthik November 25, 2022
SharkBot Malware Found in Thousands of File Manager Apps

SharkBot Malware Found in Thousands of File Manager Apps

Researchers are warning about SharkBot malware was found in several file manager Android apps on the Google Play Store, some of them with thousands of downloads. In general, Google Play…
Posted by PravinKarthik November 25, 2022
European Parliament Site took Down by Russian Pro

European Parliament Site took Down by Russian Pro

The European Parliament website was forced offline for around two hours on Wednesday after a pro-Kremlin group flooded it with traffic. It’s unclear about DDoS attack depth. The site was…
Posted by PravinKarthik November 25, 2022
Trending post
  • CISSP Domain 2 – Data Handling and Security Policies
    CISSP Domain 2 – Data Handling and Security Policies
  • CISSP Domain 2 – Data Lifecycle – From Creation to Destruction
    CISSP Domain 2 – Data Lifecycle – From Creation to Destruction
  • IRDAI 2026: India's Insurance Sector Has Run Out of Excuses on Cybersecurity
    IRDAI 2026: India's Insurance Sector Has Run Out of Excuses on Cybersecurity
  • Itron Discloses Corporate Network Breach
    Itron Discloses Corporate Network Breach
  • CISSP Domain 4: Zero Hour Exam Cram Series
    CISSP Domain 4: Zero Hour Exam Cram Series
  • CISA adds Two vulnerabilities to KEV catalog
    CISA adds Two vulnerabilities to KEV catalog
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top