Tails is a security-focused Debian based live operating system, no installation required. You can use the live operating system on any computer from a USB stick or a DVD. The operating system aimed to provide privacy and anonymity, all its…
Category: GBHackers On Security
Unkillable Android XHelper Malware Reinstall Itself Again After Factory Reset
The Android XHelper malware was first identified in October 2019, it is known for its persistent capabilities. Once it gets installed to the device, the malware remains active even after the user deletes it and restore the factory settings. Android…
80% of Exchange Servers Still Unpatched to Critical Remote Code Execution Vulnerability
Microsoft recently patched a remote code execution vulnerability with Microsoft Exchange Server that allows an attacker to use an Exchange user account to compromise the system completely. The bug resides in the Exchange Control Panel (ECP) component, which can be…
Facebook Secretly Tried to Buy Pegasus Spyware From NSO Group to Monitor Apple Users Activities & Access Data
NSO Group CEO Shalev Hulio Claim that Facebook tried to buy a Pegasus Spyware to monitor better their users especially access to the Apple user’s data and their activities. Pegasus is a powerful commercial spyware developed by Israel based spyware…
APT Hackers Abusing Microsoft Crypto API to Drop Backdoor on Windows Using Weaponized Shellcode
Researchers discovered a new wave of malware campaign that believed to be launched by APT hackers group using legitimate NSIS software to pack and launch the Shellcode on Windows. NSIS (Nullsoft Scriptable Install System) is an open-source system script-driven installer authoring…
Beware of Coronavirus-themed Attack that Attacks Windows Computer to Install’s Lokibot Malware
A new campaign observed using COVID-19/Coronavirus-themed email appears to be coming from the World Health Organization (WHO) delivers the infamous Lokibot malware. The emails include a compressed file and the compression used is ARJ, which is used for creating high-efficiency…
Warning!! Firefox Fixes 2 Zero-Day Bugs That Exploited in Wide By Executing Arbitrary Code Remotely
Its time to update your Firefox Now!! Mozilla released a security update with Firefox 74.0.1 & Firefox ESR 68.6.1 release and fixed 2 critical Zero-day vulnerabilities that actively exploited in wide as a targeted attack. Both of the vulnerabilities are…
Kinsing Malware Attacks Misconfigured Open Docker Daemon API Ports
A new malware dubbed Kinsing attacks targeting container environments, the attack particularly targets the misconfigured open Docker Daemon API ports. The campaign active for months and thousands of containers targeted every day. Researchers from Aquasec observed the attacks. Researchers believe…
iOS/macOS Webcam Can be Hacked With A Single Click On Malformed Link – Hacker Rewarded $75,000
By just making the users visiting a link, an attacker can hack the users’ iOS/macOS Camera using zero-day bugs in Safari. With iOS and macOS camera security model every app needs to assigned permission manually but Apple’s own app such…
Top 10 Best Linux Distributions In 2020
The Linux Distros is generally acknowledged as the third of the holy triplet of PC programs, simultaneously with Windows and macOS. Here we have provided you a top 10 best Linux distros list 2020 for all professionals Hence the Linux…
APT Hackers Attack Indian Financial Institutions To Exfiltrate the Sensitive Data With Crimson RAT
Researchers uncovered a new wave of an APT campaign that target the Indian financial institutions with the powerful Crimson RAT to compromise the network devices and exfiltrate the sensitive data. Crimson RAT was initially observed in 2016 that targeted the…
Kali NetHunter mid-term Updates Brings USB Arsenal for HID attacks
Kali NetHunter mid-term updates released that highlights the various development features implemented on the selected devices. The new update brings support for various features that improve the support and the compatibility of the Kali NetHunter. Kali NetHunter Updates Monitor support…
Windows Running MS-SQL Servers Under Attack!! Hackers Installing 10 Secret Backdoors on Servers
Researchers uncovered a massive attack on Windows running Microsoft SQL servers by a group of hackers using the new wave of long-running attack campaign called Vollgar. Microsoft SQL Server is a relational database management system developed by Microsoft with 3rd…
Critical Zoom Vulnerability Allows Hackers to Steal your Windows Password & Escalate Privileges with macOS
A critical vulnerability with the Zoom client for windows allows attackers to steal Windows login credentials. Zoom is an online video communication platform that has features such as video conferencing, online meetings, chat, and mobile collaboration. Zoom usability is high…
Hackers Deliver LimeRAT Malware Using Password Protected Excel Spreadsheet’s
A new malware Campaign discovered using password-protected Microsoft Excel spreadsheets to deliver LimeRAT malware. Security researchers from Mimecast discovered the attack campaign, uses an email method to deliver the read-only weaponized Microsoft Excel spreadsheets. LimeRAT malware via Excel Spreadsheet The…
Critical RCE Bug in WordPress Plugin Let Hackers Gain Admin Access on 200,000 Websites
Researchers from Wordfence uncovered two RCE vulnerabilities in WordPress SEO plugin called Rank Math let hackers hijack nearly 200,000 vulnerable Websites and gain remote access. Rank Math is an SEO plugin for WordPress and it gives various SEO features such…
Hackers Spreading Zeus Sphinx Malware to Hijack Windows Process Using Malformed MS Word Documents
Researchers uncovered a new malspam campaign through which cyber criminals launching Zeus Sphinx Malware via Coronavirus Lure Malformed MS documents. Since the novel Coronavirus pandemic rapidly spreading country to country, threat actors taking advantage of the trending news to tempting…
Hackers Using Zoom’s Popularity in Coronavirus Outbreak to Infect Computers With Malware
Cybercriminals continue to use the Coronavirus outbreak to launch various attacks such as malware, phishing, fraud, and disinformation campaigns. In the current situation, most of the organization has been closed and the employees are provided with options to work from…
Hackers Exploiting Two 0-Day Bugs in DrayTek Routers & Create A Backdoor in Enterprise Networks
Researchers observed two new hackers groups abusing two DrayTek Routers’ zero-day vulnerabilities to exploit the enterprise network routers and perform a series of attacks. Recently we have reported a similar attack in which hackers hijack Home Routers & Change The…
Top 10 Ways to Increase Strength Of Web Application Security
Web application security, one of the most significant components in the web app extension, frequently gets ignored. Within code development, app management, and visual design, web application security risks are frequently overlooked or are not accurately focused upon. And this…
COVID-19 Pandemic – Beware of Fraudulent Websites Advertised Selling Face Masks
Cybercriminals continue to take advantage of the current coronavirus situation to launch various attacks such as malware, phishing, fraud, and disinformation campaigns. We have already detailed number of cyber attacks that taking advantage of the coronavirus pandemic situation. The strain…
Most Important Network Penetration Testing Tools for Hackers and Security Professionals
Network Security tools for Penetration testing is more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Network Security Tools list that covers Performing Penetration testing Operation in all the…
Operation Poisoned News – Hackers Deliver Malware Targeting iOS Users Using Local News Links
A new campaign dubbed Operation Poisoned News that uses news local news sites links to deploy malware called lightSpy on the user’s iOS devices. Attackers posted the news articles in various forums, by clicking on the link it takes users…
Hackers Hijack Home Routers & Change The DNS Settings to Implant Infostealer Malware
Researchers discovered a new form of attack that targeting the home routers and altering the DNS settings to redirect the victims to a malicious website that delivers the infostealer malware called “Osk” that seems to have emerged in late 2019.…
Vulnerability with VLC for iOS Allows Attackers to Steal Data from Storage
A vulnerability with VLC for iOS allows local attackers to steal the data from the storage by just having the source URL/IP. The vulnerability was discovered by the security researcher Dhiraj and the flaw resides in the functionality by the…
Tekya Clicker Malware Hides in 56 Apps that Downloaded 1 Million Times Worldwide From Google Play
Google implements a number of ways to filter the malicious apps getting into the play store, but still, attackers continue to find ways to infiltrate the app store and infect user devices. Security researchers from Check Point identified 56 malicious…
Unpatched “VPN Bypass” Vulnerability in Apple iOS Let Blocks VPN to Pass The Encrypted Traffic
A new unpatched “VPN Bypass” vulnerability uncovered in Apple iOS block VPNs to encrypt all the traffic that passes through the device. The bug affected Apple’s iOS version 13.4, and it can be taking advantage of the cybercriminals to surveillance…
Most Important Cyber Threat Intelligence Tools List For Hackers and Security Professionals 2020
Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and applications. It helps with the collection and analysis of information about current and potential attacks that threaten the safety of an organization or…
Chinese APT Hackers Launching Mass Cyber Attack Using Cisco, Citrix, Zoho Exploits to Hack Gov & Private Networks
APT 41, Chinese hackers groups launched a massive cyberattack on dozens of countries around the globe using exploits that trigger the vulnerabilities in Cisco, Citrix, Zoho products. Several countries are being targeted including Australia, Canada, Denmark, Finland, France, India, Italy,…
Why You Do Not Trust Free VPNs? Top Reasons & Consequences
A Virtual Private Network is known as VPN effectively encrypts all the internet traffic sent over the internet connection and sends it to a far-off VPN server. In this entire process, everything went through the VPN server. Like for instance,…
Don’t Become a COVID-19 Identity Exploit Static
Hackers love chaos because it presents new opportunities for exploit and COVID-19 is no exception. Companies everywhere have rushed to provide work from home remote access to practice sheltering in place. This confusion gives criminals the perfect set of ingredients…
Operation WildPressure – APT Hackers Launching new C++ RAT called Milum To Gain Remote Access
WildPressure, a new APT(Advanced persistent threat) group targets organizations in the Middle East to distribute Milum RAT and to take control of the infected device. The Milum RAT was first spotted in a campaign by Kaspersky researchers in August 2019,…
Critical Remote Code Execution Bug in Linux Based OpenWrt OS Affects Millions of Network Devices
Security researcher uncovered a critical remote code execution vulnerability in OpenWrt operating system that allows attackers to inject the malicious payload on the vulnerable systems. OpenWrt is a Linux based operating system that is mainly used in embedded devices and…
Hackers Use Fake Corona Antivirus to Distribute BlackNET Remote Malware
Cybercriminals continue to use the coronavirus crisis in various spam campaigns to trick the people in installing a variety of malware. In the current scenario, all started working from home, connecting company network from home, attackers trying to take advantage…
Hackers Exploiting 2 Unpatched Windows 0-Day Vulnerabilities in Wide – Microsoft Warns
Microsoft issued a security warning for two unpatched critical windows 0-day vulnerabilities and the attackers currently exploiting in wide by executing arbitrary code remotely. 2 Vulnerabilities are uncovered in the Adobe Type Manager Library that affects all versions of Windows,…
Google Security Update Fixed Multiple High Severity Vulnerabilities in Chrome – Update Now
Google released Chrome 80.0.3987.149, a stable channel update for Windows, Mac, and Linux with the fixes for several high severity vulnerabilities. Google Addressed 13 “high” severity bugs that were reported by various external security researchers. Due to the COVID-19 outbreak,…
New Mirai Malware “Mukashi” Exploit Vulnerable Zyxel Network Storage Devices in Wide
Cybercriminals launching a new variant of Mirai Malware by taking advantage of the recently patched remote code execution vulnerability (CVE-2020-9054) in Zyxel network-attached storage (NAS) devices. The vulnerability marked as “critical” with 9.8 CVE rate, and the bug lets Mukashi…
Five Most Important Tips to Avoid Becoming a Victim of Identity Theft
Do you do most of your transactions using your credit card? Or, are you active on social media? Then, you are a potential identity theft victim. Because most online scams succeed when the perpetrator disguises as a credible person. In…
What is a VPN? Why Would I Need One
VPN means virtual private network. A VPN connection is an encrypted data connection, and this encryption takes place between the user’s device and the VPN server. All sent and incoming data are redirected via a VPN server to make your…
Hackers Spread Android Malware Via Coronavirus Safety App & Gain Contacts Access to Infect All of Them via SMS
Researchers discovered a new Coronavirus safety Android App that infects Android users via malware, as a result, it hefty usage charges for victims. Attackers taking advantage of the Coronavirus fear to continuously exploit online users by infecting their mobile with various…
APT28 Attacks Webmail and Microsoft Exchange Servers to Launch Sophisticated Spear Phishing Attacks
Pawn Storm having a group also known as APT28, Strontium, and Fancy Bear active since at least 2004, the group has targeted many organizations globally. The threat actors behind the hacking group use sophisticated social engineering lures, data-stealing malware, several…
Google Advanced Protection Program for High-Risk Users Now Includes Malware Protection
Google launched its Advanced Protection Program in the year 2017, the program aimed to protect users against phishing, blocking malicious apps, and to protect users from attackers. The program provides a high level of protection for high-risk users such as…
PWN2OWN 2020 – Researchers Earned $180K By Hacking Ubuntu, macOS, and Windows
Pwn2Own 2020 is a live hacking contest, in which contestants are challenged to exploit widely-used software, Operating system, and mobile devices. Now it’s organized by Trend Micro’s Zero Day Initiative (ZDI) for ethical hackers and security researchers who have participated…
New TrickBot Module BruteForce RDP Connections Attacks Telecommunication Industry
A New TrickBot module discovered brute-forcing RDP connections on selected targets, mostly the telecom industry. TrickBot is a well-know trojan for credential-harvesting, it is active since 2016, and it’s mainly focused on stealing financial data. TrickBot RDP Scan Module Security…
5 Bugs in Cisco SD-WAN Allows Attackers to Inject Arbitrary Commands With Root Privileges
Cisco fixed 5 security flaws in Cisco SD-WAN that allow attackers to make unauthorized changes to the system, and to execute the arbitrary commands. Out of five, three are high severity flaws and the flaws are due to insufficient input…
Beware of Android Coronavirus Tracker app that Lock’s Your Device & Asks Ransom Payment
Cybercriminals using the Coronavirus outbreak to trick users into installing malicious corona virus-related apps. In the current panic, situation users are most vulnerable to apps like Coronavirus Trackers, symptoms identification, maps, etc. Malicious Coronavirus Tracker Security researchers from Domaintools observed…
New PXJ Ransomware Delete’s Backup Copies and Disable’s User Ability to Recover any Files
Researchers discovered a new ransomware strain dubbed Pxj that encrypts users’ files appends “.pxj” extension to the encrypted files. The new ransomware strain was discovered by IBM’s X-Force Incident Response team, and the ransomware malware is all known as “XVFXGW”.…
COVID-19 Testing Center Hit By Cyberattack, All Computer Were Shut Down
Recently, the Brno University Hospital in the city of Brno, Czech Republic, has been struck by a cyberattack right in the center of a COVID-19 outbreak that is taking up steam in the small European country. Well, the hospital officials…
CoronaVirus Cyber Attack Panic – Threat Actors Targets Victims Worldwide
Spammers are using the Coronavirus outbreak to spread malware via emails claiming to be “Offer information on how to defend against the real-world virus”, according to Bleeping Computer, which attributed the campaign to Emotet. Cybercriminals are taking advantage of global…
Chinese APT Hackers Exploit MS Word Bug to Drop Malware Via Weaponized Coronavirus Lure Documents
Researchers uncovered a new COVID-19 Campaign launching by Chinese based APT threat actors by taking advantage of the Coronavirus scare to deliver the unknown malware in Windows. This attack believed to initiated by the Long-running APT group that targets various government…
How To Perform External Black-box Penetration Testing in Organization with “ZERO” Information
The objective was simple – see how susceptible the organization is from an external point of view and test the effectiveness of the security controls that are managed enterprise-wide. As such, asides, the company name, we were given “ZERO” information to…
How Can The Coronavirus (COVID-19) Disrupt Cybersecurity Operations?
As the global outbreak of the coronavirus deepens, with the novel virus now having been detected in more than 127 countries. Having originated in Wuhan, in the Hubei province in China, the coronavirus (also abbreviated as the COVID-19) has become somewhat…
Cookiethief – Android Malware that Gains Root Access to Steal Browser & Facebook App Cookies
Researchers uncovered a new powerful Android malware called “Cookiethief ” that lunched by unknown cybercriminals to steal cookies from the browsers and Facebook app by acquiring the root access on the victim’s Android device. Losing cookies to cybercriminals is deadly…
Microsoft Released Patches for Wormable Windows SMBv3 RCE Flaw – More than 48000 Hosts are Vulnerable
Microsoft patched a critical Remote Code Execution Vulnerability with Windows SMBv3 Client/Server that allows an attacker to execute code remotely. The flaw can be tracked as CVE-2020-0796 and the flaw impacts only Windows 10 Version and Windows Server Version 1903.…
Microsoft Released Patches for Wormable Windows SMBv3 RCE Flaw – More than 48000 Hosts Vulnerable
Microsoft patched a critical Remote Code Execution Vulnerability with Windows SMBv3 Client/Server that allows an attacker to execute code remotely. The flaw can be tracked as CVE-2020-0796 and the flaw impacts only Windows 10 Version and Windows Server Version 1903.…
Firefox 74 Released – Several Security Fixes & TLS 1.2 Upgraded
Mozilla released Firefox 74 with several improvements and issued security fixes that affected the previous version of Firefox 73. In this update, Mozilla has improved the login management with the ability to reverse alpha sort (Name Z-A) in Firefox Lockwise,…
Unpatched Wormable Windows SMBv3 RCE Zero-day Flaw Leaked in Microsoft Security Updates
Microsoft leaked details of an unpatched bug that exists in the Server Message Block 3.0 (SMBv3) network communication protocol reported as part of the March 2020 Patch Tuesday update. The flaw can be tracked as CVE-2020-0796 and the flaw impacts…
Unpatched Wormable Windows SMBv3 RCE Flaw Leaked in Microsoft Patch Tuesday
Microsoft leaked details of an unpatched bug that exists in the Server Message Block 3.0 (SMBv3) network communication protocol reported as part of the March 2020 Patch Tuesday update. The flaw can be tracked as CVE-2020-0796 and the flaw impacts…
Microsoft Released a Security Update With The Fixes for 115 Vulnerabilities that Affects Billions of Windows Users
Microsoft released a security update for billion of Windows Users under Patch Tuesday and fixed 115 vulnerabilities that affected various Microsoft products. The update has issued fixes including several critical vulnerabilities, and the following Microsoft products are getting a patch…
Hackers Attack Windows Users with Info-Stealer Malware via Weaponized MS Word Documents
Researchers from X-Force uncovered a malicious campaign with Info-stealer called “Raccoon” and “KPOT” that targets the Windows Users via fake emails to steal sensitive data. Raccoon malware believed to be originated from the Russian speaking hackers and it has actively…
Microsoft has Takedown the world’s Largest Necurs Botnet that Infected Nine Million Computers Globally
Microsoft has taken down the infamous Necurs botnet that impacted more than nine million computers worldwide. The Necurs botnet is the largest spam and malware botnet. The botnet is known for distributing several malware particularly the Locky ransomware malware, the…
Ex-CIA Official Allegedly Leaked CIA’s Secret Hacking Tools To WikiLeaks
Recently, on Monday in New York, a federal judge has announced the verdict in the case of a former CIA software engineer who was blamed for stealing a massive trove of the agency’s detailed secret hacking tools and leaking 8000…
Multiple APT Actors Exploiting Microsoft Exchange Email Servers Vulnerability to Take Over the Server
Multiple APT actors attempting to exploit recently patched remote code execution bug in exchange email servers. The vulnerability can be tracked as CVE-2020-0688. It affects all versions of the exchange server. The bug resides in the Exchange Control Panel (ECP)…
Critical RCE Vulnerability in Cisco Protection let Hackers Execute an Arbitrary code Remotely
Multiple critical security vulnerabilities in Cisco allow attackers to execute arbitrary commands with user consent. The vulnerability affects Cisco FXOS Software, Cisco NX-OS Software, and Cisco UCS Manager Software. Cisco FXOS and UCS Manager – CLI A vulnerability in CLI…
Apple Agrees To Pay $500 Million in Settlement For Slowing Down The Older iPhones to Buy New Models
Recently, the tech giant Apple has admitted to paying a settlement of up to $500 million, following a lawsuit blaming the company of intentionally reducing the performance of older iPhones to boost the customers to buy newer models or fresh…
New Emotet Malware Campaign Spread The Infection Across The Network Clients Via WiFi Spreader
Researchers uncovered another new wave of WiFi Spreader campaign from the Emoter malware family that was observed being delivered to multiple bots. Last month we have reported a previous Emoter campaign that taking advantage of wlanAPI interface to enumerate all…
T-Mobile Hacked – Hackers Accessed Employee’s Emails and Users Sensitive Data
US-based telecom giant T-Mobile has undergone yet another data breach this time, revealing personal account data of both its employees and customers. We have previously reported a T-mobile data breach in last year and this current breach notification posted on…
Virgin Media Hacked – Hackers Breached the Database and Accessed 900,000 People Personal Data
British Telephone company Virgin Media marketing database reportedly hacked by unknown cybercriminals and accessed the customers’ sensitive information. Virgin Media is a British company that provides telephone, television and internet services with 14.6 million broadband customers in the United Kingdom and the…
Critical Vulnerability in ppp Daemon Let Hackers Remotely Exploit the Linux Systems & Gain Root Access
A critical Buffer overflow vulnerability discovered in the pppD ( Point to Point Protocol Daemon) Let remote attackers exploit the Linux systems remotely and gain the root-level privileges. pppD ( Point to Point Protocol Daemon) often used to manage the…
Facebook Filed a Lawsuit Against Domain Registrar Namecheap for Letting Phishers to Register Look-Alike Domains
Facebook filed a lawsuit against the biggest domain name registrar for letting the phishers to register fake domains that appear to be associated with Facebook apps. These domain names are registered by attackers aiming to trick the people into believing…
Zero-Day Bug in Verisign & IaaS Services Such as Google, Amazon let Hackers to Register Malicious Domains
A critical zero-day vulnerability that affected Verisign and multiple IaaS services companies such as Google, Amazon and DeigitalOcean let attackers register t homograph domain names ( .com and .net). Successfully register these Homograph domains looks like the same well-known domains,…
U.S Based CIA Hacking Group Launched Massive Cyber Attack on China for 11 Years – A Shocking Report
A Chinese security firm revealed a shocking report that says, the U.S based Central Intelligence Agency (CIA) has continuously launched a cyber attack on China between 2008- 2019. In these 11 years of period, the CIA targets several industries in…
Kali Linux 2020.1a Released – Download Updated Kali Image for Raspberry Pi
World’s leading Penetration distribution Kali Linux 2020.1a released with some of the major changes in the installer which makes the installation process easier for users. Kali Linux also issued a new updated image for Raspberry Pi, both 32-bit & 64-bit…
Google Patches the Critical MediaTek rootkit Vulnerability that Affects Millions of Android Devices
Google patches a critical vulnerability with MediaTek rootkit chips that affect millions of devices with chipsets from MediaTek. MediaTek is a large Taiwanese chip design company that provides chips for wireless communications, High-definition television, and devices like smartphones and tablets.…
CEOs & Board Members “12 Times More Likely” To Be Target Of Cyber Attack
As the value of data increases, those with top-level access are fast becoming the target of choice. Here’s how, why, and what to do about it… In the digital era, data is big business. Recent studies have shown that just…
Hackers Abusing Window 10 Remote Desktop ActiveX control to Install New Version of Trickbot Malware
Researchers observed a new wave of infamous Trickbot Malware campaign via a dozen of malicious documents and infect the Windows users by abusing Remote Desktop ActiveX Control. TrickBot is one of the top modular banking malware that primarily targets financial information of…
SurfingAttack – Hackers Use Ultrasonic Waves to Control Voice-controlled Devices Secretly
Researchers discovered a new attack method dubbed SurfingAttack that enables the attacker to control the voice-controlled device from over a longer distance. With this attack method attackers can hijack a mobile Short Message Service (SMS) passcode, making ghost fraud calls…
TOP 11 Deep Web Search Engine Alternative for Google and Bing 2020
Deep Web Search Engine is an alternative search engine when we need to search something, then Google or Bing will the first choice hit in mind suddenly. But unlike the Deep Web Search Engine, Google and Bing will not give…
10 Yr-Old Facebook Bug Allow Hackers to Steal Access Token & Hijack Anyone’s Facebook Account – 55,000$ Bounty Rewarded
A researcher discovered a critical Account takeover vulnerability in Facebook’s Authorization feature “Login with Facebook” and, it allowed attackers to steal the Access_Token and completely take over the victim’s Facebook account. Facebook using OAuth 2.0 as an Authorization protocol that…
Former Microsoft Employee Pleads Guilty for Stealing More Than $10 Million Worth Company Digital Asset
Recently, a former employee of the tech giant Microsoft, Volodymyr Kvashuk, who worked at Microsoft from August 2016 to June 2018, was convicted in U.S. District Court in Seattle for stealing 10 million dollars in digital currency from the Microsoft.…
Hackers Launching Website Take Over Attack by Exploiting Multiple Zero-day Vulnerabilities – 150,000 + Websites Affected
Researchers uncovered a new site take over the campaign that targeting WordPress websites by exploiting the multiple WordPress Plugin Zeroday vulnerabilities. 3 popular WordPress plug-ins are exploited as a part of this ongoing site take over attack campaign. Async JavaScript, …
13-year-old Ghostcat Bug Affected Apache-Tomcat Let Hackers Remotely Inject Any Files in The Servers
Ghostcat, 13-Year old severe file inclusion vulnerability affected Apache-Tomcat server allows hackers to read or include any files in the web app directories of Tomcat remotely. Tomcat is one of the most popular Java middleware servers that used to deploy Java…
Iranian APT Hackers Attack Government Organizations via Weaponized Excel Files to Steal Network Credentials
Researchers observed a new malware called ForeLord from the Iranian APT hackers via weaponized MS excel document to attacker government organizations. Iranian Threat group called COBALT ULSTER aka MuddyWater, Seedworm, TEMP.Zagros is behind this attack and believed to be a retaliation operation…
IMP4GT – A New IMPersonation Attacks in 4G NeTworks Let Hackers To Inject Arbitrary Packets & Break LTE Network Security
Academic researchers discovered a new form of IMPersonation Attacks in 4G LTE networks called IMP4GT allowed attackers to exploit the missing integrity protection for user data and injecting malicious Arbitary packets by impersonating the victims. 4G Long Term Evolution (LTE)…
Kr00k – New Wi-Fi Vulnerability Let Hackers Decrypt WPA2-Encrypted Traffic – Billion of Devices Affected
Kr00k, a security flaw in Wi-Fi chips allows attackers to decrypt the WPA2-encrypted traffic. The vulnerability affects Broadcom and Cypress chips, these are the most common chips used by several client devices including top brands such as Amazon (Echo, Kindle),…
Kr00k – New Wi-Fi Vulnerability Let Hackers Decrypt WPA2-encrypted Traffic
Kr00k, a security flaw in Wi-Fi chips allows attackers to decrypt the WPA2-encrypted traffic. The vulnerability affects Broadcom and Cypress chips, these are the most common chips used by several client devices including top brands such as Amazon (Echo, Kindle),…
Best and Effective Ways to Keep Your Files Safe From Hackers – Guide
As more and more of our personal lives are stored digitally, our computers can effectively become extensions of ourselves. Everything from our fondest memories to our darkest secrets can be stored digitally. The issue arises then with making sure that…
What is DNS Attack and How Does it Works?
DNS Attack is a type of cyber attack that exploits the weakness or vulnerability in Domain name system. Today, the internet has turned into an integral part of our life. From communicating to banking to shopping to traveling, every aspect…
Google Released a Patch for Chrome Zero-day Vulnerability That Actively Exploited in Wide
Google Chrome issued an emergency patch to fix 3-high security vulnerabilities including a zero-day bug that actively exploited in wild. All the vulnerabilities are patched with Chrome version 80.0.3987.122 and the update is available for Windows, Mac, and Linux users.…
Firefox Brings DNS over HTTPS by Default for U.S Users: Here’s How to Enable It
Firefox Starts rolling out the DNS over HTTPS by default for U.S users to bring fully encrypted browsing experience, and the rollout continues over the next few weeks. The processing of rolling out takes a little longer time to ensure…
RCE Vulnerability in OpenSMTPD Mail Server Let Hackers Exploit The Linux Systems Remotely
Researchers discovered a critical Remote Code Execution vulnerability in the OpenSMTPD Mail server that allows attackers to completely take over the Linux systems remotely. OpenSMTPD (OpenBSD SMTP Server) is an open-source project that runs in several Unix based operating systems…
Major Vulnerabilities in Top Free Android VPN Apps Let Hackers Stealing Passwords, Photos, Messages From 120 Million Users
Researchers discovered major vulnerabilities in several Free VPN apps for Android that allow attackers to perform dangerous Man-in-the-Middle Attacks and steal usernames and passwords, photos, videos, and messages and more. There are several VPN’s caught in this list that downloaded…
Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM
An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities such as DDOS Attacks or security policy violations. An IDS works…
Most Important Network Penetration Testing Checklist
Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall…
ObliqueRAT – A New RAT Malware Distributed Through Weaponized Office Documents Targeting Government Organizations
A new malware campaign dubbed ObliqueRAT using malicious Microsoft Office documents to target government organizations in Southeast Asia. Researchers believe that the ObliqueRAT campaign linked with the CrimsonRAT campaign as they share the same similar maldocs and macros. In this…
Top Interview Tips for Cybersecurity Professionals 2020
When you interview for the profile of a cybersecurity professional the interviewer will get into the technical bits to establish your level of expertise once they finish asking you about your professional experience, educational details, and more such obligatory questions.…
8 Malicious Applications in Google Play Store Infects 50,000 Android Users to Steal Data and Generate Illegitimate Revenue
A new clicker malware found in Google play dubbed Haken aims to gain control over the affected devices and to generate illegitimate profit. Checkpoint researchers observed the new malware family while looking for another clicker malware BearClod. The Haken malware…
Millions of Windows & Linux Systems are Vulnerable to Remote Hack that Manufactured by Lenovo, Dell, HP and Others
Researchers discovered multiple unsigned firmware in various system components such as WiFi adapters, USB hubs, trackpads, and cameras used in Lenovo, Dell, HP and other major manufacturers. The flaws existing in these components allowed the attackers to compromise millions of…
LokiBot Mimics as Game Launcher To Trick the Users into Executing Malware
Lokibot trojan malware emerges first in the year 2015, it is known for stealing sensitive details such as usernames, passwords, bank details, and cryptocurrency wallets. The threat actors behind the malware continue to add various capabilities over the years and…
ATM Penetration Testing – Advanced Testing Methods to Find The Vulnerabilities
ATM Penetration testing, Hackers have found different approaches to hack into the ATM machines. Programmers are not restricting themselves to physical assaults, for example, money/card catching, skimming, and so forth they are investigating better approaches to hack ATM programming. An…