Sunday, October 17, 2021

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process of protecting your endpoints, be...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Tech News

LinkedIn officially signs EU’s Code against Online Hate speech takedown

Microsoft-owned LinkedIn is committed to doing more for the quick removal of illegal hate speech on its platform in...

Vulnerabilities in Atlassian domains Could takeover Any Atlassian Account

Vulnerabilities that could allow XSS, CSRF and one-click account takeovers in Atlassian subdomains have been patched.Atlassian, a platform used by 180,000 customers to engineer...

Attacks Maybe about to Make even more Harmful and Tumultuous

Cybercriminals continue to be successfully running ransomware campaigns while requiring higher ransoms than ever - and things might be going to get a whole...

Cloudflare launches Page Shield For Magecart card skimming attacks

Cloudflare has launched new web security service to prevent Magecart-style attacks.Magecart is an umbrella term used to describe attacks based on JavaScript, which are...

Hackers abuses OBS Studio to Spread BIOPASS Malware

Researchers from Trend Micro revealed a new malware dubbed BIOPASS, that abuses Open Broadcaster Software (OBS) Studio's live-streaming app to capture the screen of...

The Growing Threat of DDoS Attacks and Defending Against Them

The incidence and sophistication of distributed denial of service (DDoS) attacks have increased significantly this season, and this tendency has been discussed during a...

Latest News

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

Apple Releases patches for an actively exploited zero-day flaw in ios, macOS

Apple on Monday Release an urgent security patch for iOS,macOS, iPadOS, to address a zero-day flaw that has been actively exploited.Apple has revealed that...

Microsoft Releases Mitigations For New PetitPotam NTLM Relay Attack

Microsoft releases mitigations and advisory For the New PetitPotam NTLM Relay Attack that abuses a remote access protocol called Encrypting File System Remote Protocol...

Brazil is creating a cyberattack response network

Brazil is creating a cyberattack response network to promote rapid response to cyber threats and vulnerability through coordination between federal government agencies.Created by a...

OAIC: Uber found to have interfered with the privacy of over 1.2 million Australians

The Office of the Australian Information Commissioner (OAIC) has determined that Uber Technologies, Inc. and Uber B.V. have interfered with the privacy of over...

Breaches and Incidents

Cyberattack on the US govt may have started earlier than initially thought

The unprecedented cyber attack on U.S. government bureaus reported that this month might have begun sooner than last spring...

Cashalo users Data of 3.3 million sold on the dark web: NPC

Sensitive information of Cashalo users has been sold on the dark web, NPC said on Tuesday.The National Privacy Commission...

Months after cyber-attack, Stolen Data from London Council Published Online By hackers

The Information that was stolen has been published on the darknet.Sensitive data stolen from Hackney Council in the UK...

LinkedIn Suffers Data Breach of its 700mn users: Company denies allegations

Social networking Site LinkedIn Suffers Data Breach of its 700mn users, But LinkedIn denies allegations.The data exposed includes names,...

SitePoint, a Webdev tutorials site, discloses data breach

The SitePoint web developers community has disclosed a data breach after one million user credentials were sold on a...

Security Culture

GitHub fixes high Seriousness’ security flaw Seen by Google

Fourteen days after Google revealed a security defect in GitHub, the Microsoft-owned website has fixed the matter.GitHub has fixed a high seriousness security flaw...

iOS, Windows 10, Chrome, and Lots of others fall at China’s top hacking Competition

Many of the top software programs are hacked with new and never-before-seen exploits at this season's version of this Tianfu Cup -- China's biggest...

Must Read

Parking app ParkMobile experiences data breach of 21M Users

The popular mobile app that drivers use to pay and find available public parking in Pittsburgh and in other cities experienced a data breach...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Python release quick updates to Fix remote code vulnerabilities

The Python Software Foundation (PSF) has rapidly launched Python 3.9.2 and 3.8.8 to address two significant security breaches, including one that is exploited remotely...

Microsoft Releases Mitigations For New PetitPotam NTLM Relay Attack

Microsoft releases mitigations and advisory For the New PetitPotam NTLM Relay Attack that abuses a remote access protocol called Encrypting File System Remote Protocol...

40% of Remote Workers are Vulnerable to Cyber-Attacks

Two in five Remote Worker in the united kingdom are vulnerable to cyber-attacks since they haven't obtained advice about ways to steer clear of...

Months after cyber-attack, Stolen Data from London Council Published Online By hackers

The Information that was stolen has been published on the darknet.Sensitive data stolen from Hackney Council in the UK has allegedly been published online,...

Featured News

Near Up to 350,000 Spotify Users Targeted by Credential Stuffers

Security researchers have assisted Spotify handles a potentially considerable credential stuffing campaign after having an unsecured cloud database containing hundreds of millions of consumer...

UAE target of cyberattacks after Israel deal, official says

The United Arab Emirates has been the Target of cyber-attacks after formal ties with Israel, the Gulf Arab country's cyber-security Head said on Sunday.The...

Absa Suffers Data breach

Absa has informed customers of a data breach possibly compromising their private info.As stated by the Johannesburg, South Africa-based financial services team, which offers...

Facebook fined in South Korea for sharing Consumer Information without Permission

The US technology giant shared the private information of 3.3 million consumers without their approval, the South Korean authorities said.The Personal Information Protection Commission...

UK judge Rejects Assange Extradition Request of WikiLeaks founder

The London judge ruled that Julian Assange would be at extreme risk of suicide if he were sent across the Atlantic. A British court has ruled that...

Salt Project patched a privilege escalation bug impacting SaltStack Salt minions

The Salt Project has patched a privilege escalation bug impacting SaltStack Salt minions that could be used during a wider exploit chain. The vulnerability, CVE-2020-28243, is...

Malware and Vulnerabilities

A new Breed of card skimming Grelos malware is on the loose

Magecart Version has Shifted and You Ought to be Attentive, warns RiskIQA new offshoot of this Grelos card-skimming malware - a more standard Magecart...

Nvidia releases security update for high-severity flaws affecting Windows, Linux devices

NVIDIA has released security updates to address six security vulnerabilities found in Windows and Linux GPU screen drivers, as well as ten additional flaws...

Critical bug found in Cortex XSOAR Allows Remote ‘War Room’ Access

A critical vulnerability in Palo Alto Networks, Cortex XSOAR system could have allowed an attacker to perform a command and control in the Cortex...

Bug in a shared SDK may allow attackers to join calls undetected across multiple apps

A small library that provides audio and video call capabilities contain a bug that allows attackers to join audio and video calls without being...

Threat Actors

Botnets have been Silently mass-scanning the Web for unsecured ENV Documents

Threat Actors are searching for API tokens, passwords, and database logins generally stored in ENV documents.Drawing little focus on themselves, multiple hazard Actors have...

Cybercriminals are Doing Microsoft Exchange Exploitation by installing Cryptojacking

Cybercriminals continue to exploit Microsoft Exchange unpatched servers. Cybersecurity investigators at Sophos report an unknown attack after trying to use ProxyLogon to exploit the...

Malware Produces scam online stores on top of hacked WordPress sites

The malware gang poisoned the victims' XML sitemaps with tens of thousands of scammy entrances, lowering the websites' SERP ranking.A brand new cybercrime gang...

UK police warn of sexual harassment in intimate online dating chats

There are people out there who are trying to take advantage of the only way to date during the epidemic.As politicians play whack-a-mole on...

New Cyber Technologies

Google launches Cloud Armor Adaptive Protection Technologies to prevent DDoS attacks

Google LLC said now it is progressing smart automation inside its cloud network security controls within its continuing mission to shore up its clients'...

NTT develops secure authentication method for Datacenters with Fath Mechatronics, peaq

NTT Global Data Centers EMEA has awakened with Fath Mechatronics and peaq to make a new sort of access control system for information centers....