Posts

Showing posts from 2021

Researchers Demonstrate Malware Attacks On Hidden (OP) SSD Area

Apache Releases Log4j 2.17.1 Fixing Another Code Execution Flaw

Multiple Riskware Apps Flood Samsung’s “Galaxy Store” App Store

LastPass Master Passwords Seemingly Hacked Through Credential Stuffing

All that you need to know about Identity Orchestration

Researchers Caught Multiple Backdoors In Auerswald VoIP Phone System

New Formbook Malware Targets Unpatched Windows Systems – Update Now!

Vulnerabilities In Garrett Walk-Through Metal Detectors Allow Remote Attacks

How to Avoid Getting Your Instagram Account Hacked

US CISA, CrowdStrike Release Free Log4j Scanners

New AvosLocker Ransomware Exploits AnyDesk, Reboots System In Safe Mode

HackDHS Bug Bounty Program Now Includes Log4j Bug Reports

Subdomain Takeover Flaw Affected Flywheel WordPress Hosting Platform

Researcher Discovered Site Isolation Bypass In Google Chrome – Bug Fixed

Is Your Business At Risk? How You Can Improve Security For Your Company

Multiple Vulnerabilities Found In Microsoft Teams – Only One Fixed So Far

New Log4j Attack Vector Exploits WebSocket To Trigger RCE – Update to Log4j 2.17.0

Hackers Targeted Belgium Defense Ministry Exploiting Log4j Bug

Cybersecurity Careers Around the World

Advantages of Shift Left Testing in DevOps

An IDOR Bug In Facebook Android Could Expose Page Admins – Patch Deployed

Apache Releases Third Major Log4j Update To Fix A DoS Flaw

Google’s OSS-Fuzz Tool Now Detects “Log4Shell” Via Jazzer

Joker Malware Disguised As ‘Color Message’ App Targeted 500K Android Users

New Hancitor Malware Loader Delivers Malware Via Clipboard

Wireless Coexistence Attacks Exploit (Systems on a Chip) SoCs

How to secure your laptop at college?

Meta Expands Facebook Bug Bounty To Include Scraping Bugs

Microsoft Teams End-to-End Encryption Now ‘Generally Available’

Microsoft December Patch Tuesday Out With 67 Bug Fixes Including A Zero-Day Patch

New Phishing Campaign Targets German Banks Via QR Codes

Hillrom Addressed A Zero-Day Vulnerability Affecting Its Cardiac Devices

Microsoft Launch Vulnerable And Malicious Driver Reporting Center

What is a Screen Time Password, and How to Reset it?

Another Apache Log4j Bug Discovered – Patch Released – Update (Once Again!)

Yes – Vaccine Cold Storage Can Be Hacked

Hackers Attacked 1.6 Million WordPress Sites Via Four Different Vulnerable Plugins

‘Vaccine’ For Apache Log4j Vulnerability Released Amidst Active Exploits

Multiple Vulnerabilities Found In GoAutoDial Call Center Software

What is Cyber Security Risk Modeling?

WooCommerce Credit Card Stealer Found Implanted in Random Plugins

Critical ‘Log4Shell’ Zero-Day Vulnerability Wreaks Havoc Online

Top 5 Security Concerns of SaaS Users

Numerous Flaws In USB Over Ethernet Crippled Many Cloud Services

Top 5 Tips to Prevent Getting Hacked While Working from Home

What is Camfecting and what can you do about it?

Reasons Your Sales Team Needs Email Tracking Software

Hackers Target Random Business Printers To Spread Anti-Work Messages

Mozilla Patched “BigSig” Vulnerability That Affects The NSS Cryptographic Library

Types of Encoders

AWS, CrowdStrike, Presidio Join Hands To Develop Ransomware Mitigation Kit

Twitter Expands Its Information Policy To Avoid Media Sharing Without a Users Consent

Printing Shellz Vulnerabilities Affected 150+ HP Printers

Android Banking Trojans Garnered 300K Downloads By Faking Apps

5 Online Security Tips to Prevent Hacking

Latest SpyAgent Malware Campaign Abuses Legit RATs To Target Devices

Multiple Vulnerabilities Spotted In Zoom Video Conferencing App

New TrickBot Phishing Technique Checks Device Screen Resolution To Evade Detection

T-Reqs – A Tool For HTTP Request Smuggling (HRS) attacks

Zoom Launches Auto-Update Feature For Windows And Mac Clients

CronRAT Linux Malware Abuses A Non-Standard Date To Evade Detection

Threat Actors Used Tardigrade Malware In Attacks On Biomanufacturing Firms

EdbMails Review

New RATDispenser JavaScript Loader Delivers Infostealers To Pilfer Passwords

Ongoing Phishing Attack Targets IKEA Employee Mailboxes To Spread Trojan

MediaTek Smartphone Chip Vulnerability Could Allow Spying On Android Smartphones

Multiple Vulnerabilities Spotted In Hide My WP WordPress Plugin

How to get a deal on cybersecurity software

Hacking Fingerprints With a $5 Setup To Bypass Biometric Authentication

How to Secure Your New Motor Vehicle

Microsoft Silently Rolls Out “Super Duper Secure Mode” With Latest Edge Browser Versions

LAPD – A New Method To Detect Spy Cameras Via Smartphone

Drupal Release Patches for CKEditor XSS Bugs

Hackers Selling 7 Million Robinhood User Email Addresses

How to Monitor Your Child’s Phone

New Golang-based Linux Malware Targets Ecommerce Platforms

Meta Defers Facebook Messenger, Instagram Default E2E Encryption Until 2023

California Pizza Kitchen Admits Data Breach Exposing SSNs Of Its Employees

FBI Issued Flash Alert For FatPipe Zero-Day Bug Under Attack

Multiple Vulnerabilities In Zoom Apps Risk Meetings’ Security

Vulnerability In Sky Routers Risked Over 6 Million Customers

Researcher Earns $10K Bounty For A Google Cloud Project SSRF Flaw

BrazKing Android Malware Evolves Into A Potent Banking Trojan

For Small Businesses, Cybersecurity is Non-Negotiable

Off-chain and On-chain cryptocurrency transactions

Have the .NET Framework’s Security Woes Finally Come to an End?

What happened in the easyJet data breach?

Do you want to start building your website? Here are 6 helpful tips

Golang-based BotenaGo Malware Targets IoT Devices With Dozens Of Exploits

New DoubleX Extension Analyzer Tool Detects Rogue Browser Extensions

Joker Malware Disguised As Smart TV Remote App Targets Android Users

Starter Templates Plugin Flaw Affected 1M+ WordPress Sites

WP Reset PRO Plugin Bug Could Allow Wiping Site Databases

HTML Smuggling Attack In The Wild Targeting The Banking Sector

Driftwood Security Tool Released to Prevent Private Key Leaks

Google Release ClusterFuzzLite Fuzzing Tool As Part Of CI/CD Workflows To Find Bugs

MacOS Zero-Day Vulnerability Allowed Keylogging and Screengrabs

Damage caused by hacking in the legal profession

New Phishing Campaign Exploits Proofpoint’s Name To Steal Credentials

Phishing Attack Triggers Electronic Warfare Associates Data Breach

bZx DeFi Platform Lost $55 Million Stolen In The Latest Crypto Heist

Multiple Vulnerabilities Discovered In Philips Tasy EMR Solution

US CISA Pushes Vendors For BrakTooth Patches After PoC Goes Public

Heap Overflow Bug Affects All Linux Kernels Via TIPC Module

The Fastest WordPress Themes of 2021

Facebook Sunsets Face Recognition And Deletes Users’ Data Due to Privacy Concerns

How to Prototype a Mobile Application in 2021

7 Reasons Why Cybersecurity Is Important to Your Marketing Strategy

Getting to Know the Various Data Security Compliance Laws

How to Hide Your Torrenting Activity: A Handy Guide

How To Make Sure Your Business Website Is Running Smoothly

Why Web Application Firewalls and Website Security are so Crucial for all Organizations? 

Apple Fixes Critical Bugs, Including A Zero-Day, With Latest iOS 14.8.1

HashThemes Demo Importer Plugin Bug Could Allow Wiping WordPress Sites

Chrome Zero-Day Mayhem Continues – Google Fixed Two More Flaws

Cross-Site Scripting Vulnerability Riddled NextScripts WordPress Plugin

OptinMonster Plugin Bug Potentially Risked Over A Million WordPress Websites

Facebook Goes “Meta” To Emphasize The Firm’s Expanding VR Focuses

Cream Finance Crypto Exchange Hacked Again Losing $130 Million

7 Secrets of Successful Software Development Process in 2021

Mozilla Removed Two Popular Firefox Add-Ons For Abusing Their Proxy API

Critical Polygon Blockchain Vulnerability Could Allow Withdrawing Huge Amounts

Do you need to learn HTML to work as a content manager?

Why It’s Important To Protect Your Personal Information

Serious RCE Vulnerability Affects Older WinRAR Versions

Tracking Mobile Devices by Analyzing Bluetooth Transmissions

A Punctuation Error May Expose Users’ Search Terms to ISPs Via Chrome And Firefox

Facebook Launched SSRF Dashboard Tool Helps Spot SSRF Bugs

How Your Business Can Benefit From Using Cloud-based Collaboration Services

L0phtCrack Password Auditing Tool Now Available As Open Source

JavaScript Obfuscation Now Often Used By Hackers To Hide Malware

LANTENNA Attack – A New Technique To Sniff Data From Air-gapped Networks

A GPSd Bug May Push You 20 Years Back From October 24, 2021

Brave Rolls Out Its Own Search Engine By Default Ditching Google

Google Chrome Removed FTP For Good – Deletes Code With Chrome 95

The Deep-Learning Algorithm Can Guess an ATM PIN, Even With Keypads Covered

LightBasin Hacking Group Switches Focus From Windows To Linux To Target Telecom Sector

HTTPA – Taking HTTPS Security To The Next Level

Gummy Browsers – An Attack Exploiting Browser Fingerprinting

How To Build A Cybersecurity Program From Scratch

LINE App Admits Limited Mishandling Of User Data – Elaborates On Data Sharing Policies

1Password Launches Psst! Tool For Secure Password Sharing

Critical Vulnerability Cripples Visual Tools DVR Allowing RCE Attacks

5 Website Security Tips

Researchers Devise Prefetch Side-Channel Attack Threatening AMD CPUs

Cybersecurity And Web Hosting: What Businesses Need To Know

Critical Vulnerabilities Discovered in Fastest Cache Plugin For WordPress

OpenSea Vulnerabilities Allowed Malicious NFT Uploads To Steal Crypto

Microsoft October Patch Tuesday Addresses 4 Zero-Day Vulnerabilities

3 XDR Solutions: Extended Detection And Response Services In 2021

Malware Goes Beyond Ancient Jigsaw

Vulnerability In LibreOffice And OpenOffice Allows For Spoofing Digital Signatures

Apple Patched Zero-Day Vulnerability With iOS 15.0.2 Emergency Update

6 Tips to Harden Your Ruby on Rails Applications

Researcher Disclosed Telegram Vulnerability, Refused Bounty For Staying Quiet

Mozilla Rolled Out Firefox 93 With New Privacy Protection Features

Facebook’s Sufferings Continue As Instagram Goes Down Again a Week Later

Growing Threats to Enterprise Security Require a Consolidated Approach

Twitch Disclosed a Massive Hack Leaking Internal Source Codes

How to Protect Your Enterprise’s Data in a Remote Attack World

Yubico’s New Bio Series Security Keys Support Biometric Authentication

Navigating Path Traversal Vulnerabilities in Java Applications

Why Businesses Need to Refresh Cyber Resilience in the Cloud Era

Serious Data Exposure Vulnerabilities Spotted In OnionShare Platform

5 Crucial Tips for Building a Mobile App for Your Business

3 Ways the Government Can Track Your Phone

Here’s What Caused Facebook’s Global Outage

Google Patched Two Further Zero-Day Vulnerabilities With Latest Chrome Browser Release

Hackers Try To Steal OTP Via Malicious Telegram Bots In Recent Campaigns

Researchers Discover How Hackers Were Stealing Money Via Apple Pay From iPhones

Facebook Releases Android App Security Tool “Mariana Trench” As Open-Source

Stellar Photo Recovery Review – A Tool to Recover Lost Photos, Videos, And Audio Files

Elastic Stack API Security Vulnerability Exposes Customer and System Data

The expert assessed the prospects of cybersecurity company Group-IB after the arrest of its founder

Google Announced Patch Reward Program For Tsunami Security Scanner

Analysts Warn of Telegram Powered Bots Stealing Bank OTPs

Newly Discovered 'Tomiris’ Backdoor Linked to SolarWinds Attack Malware

Ransomware Attack On Major European Bookseller

RansomEXX Comes into Action Encrypting Files Using AES-CBC