There has been an addition to the Iranian APR group Charming Kitten’s malware arsenal recently with the addition of a new malicious tool. This newly added tool authorizes the threat actors to retrieve user data from the following accounts:- Gmail…
Tag: GBHackers On Security
How Can WAF Prevent OWASP Top 10?
The OWASP Top 10 security risks point out the common vulnerabilities seen in web applications. But it does not list the set of attack vectors that WAFs (Web Application Firewalls) can simply block. This is but a myth often propagated…
Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation
What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of compromise become visible. Use of IoA’s provides a way to shift from reactive cleanup/recovery to a proactive mode, where attackers…
Grandoreiro Banking Trojan Targeting Automotive, Chemicals Manufacturing Industries
The Grandoreiro is a banking trojan that has been identified recently by the security analysts at Zscalerin in recent attacks, and threat actors are using it as a vector for cyberattacks. Workers at the chemical manufacturing company in Spain and…
Malware in Counterfeit Android Device Attack on WhatsApp and WhatsApp Business
Researchers from Doctor Web identified backdoors in the system partition of budget Android device models which targets WhatsApp and WhatsApp Business messaging apps. This malware could allow attackers to carry out various malicious activities. “Among them is the interception of…
Hackers Exploited a Zero-day Flaw in Bitcoin ATM Servers to Steal Cryptocurrency
General Bytes Bitcoin ATM servers have been exploited by hackers in order to steal cryptocurrency from their customers as a result of a zero-day vulnerability. Whenever cryptocurrency was deposited or purchased via the ATM, hackers would take advantage of the…
Hackers Attack Hotel & Travel Organizations to Steal Sensitive Data
Hackers classified as TA558 have been increasing their activities since the beginning of this year. There has been an increase in the number of phishing campaigns run by the TA558 group and targeting a range of hotels and travel companies.…
Russian APT Group Attack Microsoft 365 users Abusing Azure Services
There has been a surge in cyberespionage attacks levied by Cozy Bear (aka APT29 and Nobelium), a Russian cyberespionage group backed by the Russian government. The cybersecurity analysts at Mandiant affirmed that to gain access to foreign policy information in…
Largest Layer 7 DDOS Attack Recorded By Google with 46 Million Requests Per Second
Google has been targeted with the largest DDoS attack in history against one of its customers. An attack on one of the Google Cloud Armor customers occurred on June 1st, during which 46 million requests were sent per second to…
Most Important Computer Forensics Tools for Hackers and Security Professionals
Computer Forensics tools are more often used by security industries to test the vulnerabilities in network and applications by collecting the evidence to find an indicator of compromise and take appropriate mitigation Steps. Here you can find the Comprehensive Computer…
Hackers Using Bumblebee Loader Malware to Attack Active Directory Services
Threat actors associated with BazarLoader, TrickBot, and IcedID have increasingly co-opted the malware loader Bumblebee. It has been discovered that hackers are using it to penetrate target networks for the purpose of post-exploitation activities as part of their campaigns to…
35 Malware Android Apps With over 2 million Installation Found on the Google Play Store
It has become increasingly common for threat actors to use Google Play Store to attempt to get malicious applications listed there in recent years. In terms of trafficked Android app sources in the world, Google Play Store is considered the…
Researchers Bypassed Android 13’s New ‘Restricted Setting’ Security Feature
Android 13, the new version released by Google last week. The new Android 13 brings in various security upgrades and particularly Google has ‘restricted’’ the use of Accessibility Service in the new version. However, Threat Fabric says they have successfully…
Warning!! New Chrome 0-Day Bug Being Exploited In The Wide
Google Chrome released a new security update for Windows, Linux & Mac users and an update for a new high severity Zero-day bug that is being actively exploited wide by unknown threat actors. Chrome 104 was released with the fixes…
Malicious Browser Extensions Targeted Over 7 Million Users
In the past two years alone, more than 7 million users have endeavored to install malicious browser extensions on their systems. While the majority of these extensions are used by the threat actors as an adware to display advertisements to…
Microsoft Disrupted Russia-Linked APT SEABORGIUM Targeting NATO Countries
Microsoft Threat Intelligence Center (MSTIC) has noticed and taken measures to interrupt campaigns launched by SEABORGIUM, a Russia-based actor launching persistent phishing, credential and data theft, intrusions, and hack-and-leak campaigns tied to espionage targeting NATO countries. Insights into SEABORGIUM’s Activities…
SOC Analyst Training – Cyber Attack Intrusion Analysis With SIEM Tools|From Scratch To Advanced
SOC Training is one of the most important concernS in order to build a Quality Security Operation Center Team to fight against advanced threats that target the organization network. Sophisticated detection and prevention technologies are mandatory implementations by security experts…
Twilio Hack -Over 1,900 Signal Users’ Phone Numbers were Exposed in the Data Breach
Signal, a cross-platform centralized encrypted instant messaging service declares that a data breach at Cloud Communication Company Twilio exposed almost 1,900 Signal users’ phone numbers. Twilio provides phone number verification services for Signal and notably on August 4th, it disclosed…
Researchers Hacked SpaceX Operated Starlink Satellite Using $25 Modchip
In a hacking attempt carried out by a security researcher, Lennert Wouters, at the Belgian university KU Leuven, the Starlink satellite-based internet system operated by SpaceX was successfully hacked. The most shocking thing is that it cost him approx 25…
Researchers Noticed a Peak in VNC Attacks – Over 8,000 Servers Exposed Online without a Password
Over 8,000 VNC endpoints have been discovered by researchers at Cyble security firm to be exposed to the internet. Threat actors can easily gain access to internal networks by accessing and using these exposed VNC endpoints without any authentication. VNC…
Conti Ransomware Operators Using ‘BazarCall’ Style Attack as an Initial Vector
In the context of phishing attacks, a BazarCall style attack is a form of targeted phishing that uses a call-back methodology in order to trick the user. For the first time, this emerged to be marketed in 2020/2021 as a…
Top 10 Best Penetration Testing Companies – 2022
Penetration Testing Companies are pillars when it comes to information security, nothing is more important than ensuring your systems and data are safe from unauthorized access, Many organizations have a flawed security culture, with employees motivated to protect their own…
The Building Blocks of Zero Trust Security Architectures on AWS
Amazon Web Services (AWS) is a leading cloud platform holding a dominant grip of 41.5% of the public cloud market. AWS has over 1 million users worldwide with revenues of 18 billion in the first Q of 2022 alone. A…
Researchers Found Series of Vulnerabilities in the Software Underlying Microsoft Teams & Other Apps
Security researchers discovered a series of vulnerabilities in the software underlying popular apps like Discord, Microsoft Teams, Spotify, and many others. Reports say the group of researchers presented their findings at the Black Hat cybersecurity conference in Las Vegas, explaining…
Ex-Twitter Employee Found Guilty of Sharing User’s Private Information to Saudi Arabia
A former Twitter employee was found guilty of acting as an agent of a foreign government and illegally sharing Twitter user information. Reports say, Ahmad Abouammo aged 44, formerly of Walnut Creek, California, and at present residing in Seattle, was…
Cisco Was Hacked by Yanluowang Ransomware Operators to Stole Internal Data
Recent reports indicate that in late May Cisco’s corporate network was infected with ransomware from the Yanluowang group. Under the threat of leaking stolen files to the online world, the threat actor attempted to intimidate the victims into making a…
Top 7 Best Endpoint Detection & Response Products With Sandboxing Solutions – 2022
Endpoint detection and response (EDR) is a form of security solution that offers real-time visibility into anomalous endpoint behavior by continuously recording, storing and monitoring endpoint information. EDR software solutions automatically initiate alerts for more detailed investigation when it identifies…
Global Scam-as-a-service Operation “Classiscam” Target Users to Steal Payment Data
The cybersecurity firm Group-IB, one of the world’s most prominent companies, has identified Classiscam as a potential threat. This recent wave was detected by Group-IB in March 2022 that has been causing a lot of concern. Singapore is currently experiencing…
Hackers Use Open Redirect Vulnerabilities in Online Services to Deliver Phishing Content
Researchers at Resecurity noticed threat actors leveraging Open Redirect Vulnerabilities which is popular in online services and apps to evade spam filters to deliver phishing content. Trusted service domains like Snapchat and other online services make special URLs that lead…
Kali Linux 2022.3 Released – What’s New !
Kali Linux 2022.3 was released recently, which contains new tools for hacking that were never before available. All the updates in this release can be downloaded or updated directly from the web browser, so you don’t need to wait. Each…
Kali Linux 2022.3 Released With Real-time Chat, Test Lab, and New Tools
Kali Linux 2022.3 was released recently, which contains new tools for hacking that were never before available. All the updates in this release can be downloaded or updated directly from the web browser, so you don’t need to wait. Each…
Chinese APT Hackers Target Govt & Defense Orgs Using New Windows Malware
In January, a series of attacks using new Windows malware was detected using several countries in Eastern Europe to backdoor entities in the government and military sectors, as well as firms in the defense industry. There has been a link…
Beware of New Malware that Distributed through Compromised YouTube Accounts
Cyble Research Labs (CRL) specifies that the stealers such as PennyWise and RedLine are increasing and spreading through YouTube campaigns. In their analysis, they have identified more than 5,000 PennyWise Stealer executable samples in the last 3 months alone. The…
Masscan – World’s Fastest Scanner – Scan the Entire Internet in Under 6 Minutes
Masscan – Worlds fastest scanner can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second. Masscan is an Internet-scale port scanner, useful for large-scale surveys of the Internet, or of internal networks. While the default…
Stegomalware Surge – Attackers Using File, Video, Image & Others To Hide Malware
A surge in the number of Stegomalware instances using Steganography has been reported recently by the cybersecurity experts at Cyble Research Labs. Steganography is mainly a method that entails concealing data inside of a normal message or file in a…
Hackers Exploiting High-Severity Zimbra Flaw to Steal Email Account Credentials
Zimbra CVE-2022-27824 has been added to the CISA’s “Known Exploited Vulnerabilities” catalog as a new vulnerability. Hackers are actively exploiting it in attack activities, which indicates it is active in the hacking community. Unauthenticated threat actors are able to steal…
A New Remote Access Trojan Dubbed Woody Rat Delivered as Office Documents
The Threat Intelligence team of Malwarebytes discovered a new Remote Access Trojan called ‘Woody Rat’ that targets Russian entities by using lures in archive file format and Office documents leveraging the Follina vulnerability. Malwarbytes researchers stated that the threat actors…
Hackers Exploited Twitter Zero-day Bug to Expose 5.4 Million Accounts
Over 5.4 million Twitter user accounts a threat actor compiled profiles in order to create a list of the accounts. Using this ID, the threat actor then scraped the public information associated with this account to create a threat model. …
Dark Utilities – A C2aaS Platform Leveraged By Hackers To Implant Malware
Dark Utilities is a new service that has been discovered recently by security researchers at Cisco Talos. In order to set up a C2 center for their malicious operations, cybercriminals can use this service to provide them with an easy…
VirusTotal Reveals List of Most Mimicked Legitimate Apps in Malware Attacks
The cybersecurity analysts at VirusTotal recently discovered that an increasing number of threats are being used to mask legitimate applications with fake versions. In order to perpetrate social engineering attacks successfully, threat actors mimic the legit applications to achieve their…
20 World’s Best Free Hacking Books For 2022
In today’s article, we will discuss the best 20 Hacking Books, hence, if you want to learn the hacking properly, and you are a beginner, then you must have to follow these books that we have mentioned below. All these…
ZTNA: 4 Letters That Can Change the Dynamic of Your Business Landscape
The cybersecurity landscape has evolved since the shift to remote work began a few years ago. Gone are the days of setting up firewalls to filter website traffic or a hardware VPN solution to protect your resources. The focus of…
Multiple Flaws in Cisco Small Business Routers Allow Remote Attackers to Execute Arbitrary Code
Cisco has released software updates that address multiple vulnerabilities in Cisco Small Business VPN routers which allow an unauthenticated, remote attacker to execute arbitrary code or cause a denial of service (DoS) condition on an affected device. Vulnerable Products The…
Multiple Vulnerabilities on VMware Let Attackers Gain Admin Privileges
VMware recently issued an advisory warning for the administrators that multiple products on the VMware Cloud Platform are affected by multiple flaws, and among them, there is a critical authentication bypass security flaw. By exploiting this critical flaw an attacker…
Taiwanese Websites Hit by DDoS Attacks Ahead of Nancy Pelosi’s Visit
Taiwan’s Presidential website and several websites run by the government of Taiwan were disrupted by distributed denial-of-service (DDoS) attacks hours before United States Speaker Nancy Pelosi’s visit to mainland China. According to NBC News Report, the attacks hit four websites,…
Over 3,200 Mobile Apps are Exposing Twitter API Keys that Enable Account Take Overs
Cybersecurity Company CloudSEK examined a broad range of apps for possible data leaks and discovered 3,207 apps leaking Twitter API keys, that can be utilized to gain access to or to take over Twitter accounts. The report says 230 apps,…
Largest DDoS Attack Ever – 659.6 Million Packets Per Second
In the past few weeks, an organization in Eastern Europe has been the victim of the biggest DDoS attack that the continent has ever experienced. During the past month, several DDoS attacks have been launched against the target, a customer…
24-Year-Old Australian Hacker Arrested For Creating and Selling Spyware
A 24-year-old man was arrested and charged with creating and selling spyware, triggering a global law enforcement operation. As a result, the AFP has charged a number of criminals and domestic violence perpetrators who purchase these illicit tools. Since the…
Android Apps on Google Play Store to Distribute Banking Malware as Document Scanners
Users’ devices have been compromised by banking malware via a malicious campaign uncovered by Trend Micro exploiting the Google Play Store’s Android apps. 17 Android dropper apps that appear to be harmless have been used as part of this malicious…
Hackers Use New Tactics To Spread Malware as Microsoft Blocked Macros by Default
As Microsoft Office began blocking malicious macros by default in many of its programs, hackers began to change their tactics after they had previously distributed malware via phishing attachments with malicious macros. The cybersecurity experts at Proofpoint have claimed that…
Hackers Use New Tactics as Microsoft Blocked Macros by Default
As Microsoft Office began blocking malicious macros by default in many of its programs, hackers began to change their tactics after they had previously distributed malware via phishing attachments with malicious macros. The cybersecurity experts at Proofpoint have claimed that…
How To Select Your Pentest Vendor: Guide
Systematic Penetration Testing is the only way to be a step ahead of hackers, so it is worth spending money on. But there are thousands of companies offering penetration tests. You need to decide what exactly you want from the…
Is this website Safe : How to Check Website Safety to Avoid Cyber Threats Online
is this website safe ? In this digital world, Check website safety is most important concern since there are countless malicious websites available everywhere over the Internet, it is very difficult to find a trustworthy website. We need to browse smart and…
Attackers Targeting MS-SQL Servers to Steal Bandwidth for Proxy Services
A number of factors have emerged over the past few years that have allowed the attackers to generate handsome revenue, including the following:- Bundles that include adware Malware Invading vulnerable Microsoft SQL servers Here, the cybersecurity researchers at Ahnlab have…
Most Important Android Application Penetration Testing Checklist
Android is the biggest organized base of any mobile platform and developing fast—every day. Besides, Android is rising as the most extended operating system in this viewpoint because of different reasons. However, as far as security, no data related to…
5 Benefits of a Cloud Firewall
Firewalls have been a staple of almost every organization’s security since its inception in the late 80s. A firewall is a network security device that’s used to detect malicious traffic coming into and outside of a private network. But the…
Attackers Use Malicious IIS Extensions to Deploy Covert Backdoors into Exchange Servers
As opposed to web shells, malicious extensions for the IIS web server have a lower detection rate, which means attackers are increasingly using them to backdoor unpatched Exchange servers. Since they can be hidden deep within a compromised server, and…
Chinese Hackers Deploy Malware in Firmware Images of Certain Motherboards
CosmicStrand is a new and sophisticated UEFI firmware rootkit that has been attributed to an unknown Chinese-speaking hacker. In a study conducted by Kaspersky Lab, researchers came up with the name CosmicStrand for this attack. Earlier, however, malware analysts at…
North Korean APT37 Hackers Attack EU Countries with Konni RAT Malware
It has been discovered by security researchers at Securonix that APT37, a North Korean hacking group, has launched a new campaign that is associated with the group. This group targets high-value organizations that are located in the following countries:- European…
Beware!! Hackers Distribute Amadey Malware Pushed via Software Cracks & Keygen Sites
Software cracks and keygen sites are used as bait to distribute the latest version of the Amadey Bot malware with the help of SmokeLoader malware. The malware strain called Amadey was found over four years ago, and is capable of…
Most Important Network Penetration Testing Tools for Hackers & Security Professionals
Network Security tools for Penetration testing is more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Network Security Tools list that covers Performing Penetration testing Operation in all the…
3 Actions Enterprises Must Take After Suffering a Data Breach
Data security is paramount in modern organizations. Data breaches put your company in a vulnerable position. Not only do they attract heavy fines from regulators, but they also damage your brand. Customers lose trust, and the results can be catastrophic.…
T-Mobile Decides To Settle $350 Million For Massive 2021 Data Breach
A class-action lawsuit brought by a group of customers against T-Mobile relating to the 2021 hack has been settled for $500 million. Approximately 76.6 million US residents’ personal information has been exposed due to this data breach. T-Mobile is claiming…
Critical SonicWall Vulnerability Allows SQL Injection – Patch Now!
A critical SQL injection (SQLi) vulnerability was recently patched by the network security company SonicWall as a result of a new update. The company’s Analytics On-Premise and Global Management System (GMS) products are affected by this critical flaw and as…
Security Giant Entrust Hacked – Attackers Stole Data From Internal Systems
Entrust, a big name in digital security, announced recently on its website that it has been attacked by hackers. During this attack, hackers breached their firewalls and stole data from their internal systems through breaches in their network. It is…
Most Important Security Tools For Security Researchers & Malware Analyst
Security Professionals always need to learn many tools, techniques, and concepts to analyze sophisticated Threats and current cyber attacks. Here we are going to see some of the most important tools, books, Resources which is mainly using for Malware Analysis…
Cloud Computing Penetration Testing Checklist & Important Considerations
Cloud Computing Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code. Cloud computing is the shared responsibility of Cloud provider and client who earn the service from the…
Google Chrome 0-Day Vulnerability Exploited in The Wild To Deploy Spyware
This month came to light a zero-day vulnerability that has long been exploited by evildoers inside Google Chrome, but that has now been patched by the company. This flaw has been weaponized by an Israeli spy company and used in…
LinkedIn Remains Number One Brand to be Faked in Phishing Attempts
It has been noted recently by the cybersecurity analysts at CheckPoint that in the second quarter of 2022, LinkedIn is on top of the list of most impersonated brands regarded in phishing campaigns. LinkedIn impersonation was down from 52% to…
Hackers Attack Windows, Linux & ESXi Systems Using Rust-Based Malware
A new ransomware family dubbed Luna was identified by Kaspersky Security researchers recently and it has been claimed that it’s written in Rust. With its use of the programming language, it becomes the third strain to use the language after…
Cisco Nexus Dashboard Flaw Let Remote Attacker Execute Arbitrary Commands
The Cisco Nexus Dashboard data center management solution was found to have severe vulnerabilities that Cisco has addressed recently. The total number of vulnerabilities identified was 45, which affected a wide variety of products and services. A remote attacker can…
Beware!! Several Apps on Play Store Delivering Joker, Facestealer & Coper Malware
Typically, users who want to find and install android apps of the highest quality are recommended to rely on Google Play Store as one of the most trusted sources. In order to prevent fraud in the official Play Store, Google…
The Next-Generation Secure Web Gateway (SWG) – What You Need To Know?
Check Point noted in their recent 2022 Cloud Security Report that 27% of organizations have experienced a security incident in their public cloud infrastructure within the last 12 months. With the growing number of cloud IT-related threats, organizations are going…
The Next-Generation Secure Web Gateway (SWG) is Here – What You Need To Know?
Check Point noted in their recent 2022 Cloud Security Report that 27% of organizations have experienced a security incident in their public cloud infrastructure within the last 12 months. With the growing number of cloud IT-related threats, organizations are going…
The Next-Generation SWG is Here – What You Need To Know
Check Point noted in their recent 2022 Cloud Security Report that 27% of organizations have experienced a security incident in their public cloud infrastructure within the last 12 months. With the growing number of cloud IT-related threats, organizations are going…
Roaming Mantis Hackers Group Attack Android & iOS Users to Deploy Malware
Following its attack against users in the following countries, the Roaming Mantis operation has now attack users in France with Android and iOS devices. Germany Taiwan South Korea Japan The US The UK Around tens of thousands of users per…
Russia Fines Google $358 Million for Failing to Restrict Access Information Recognized As Prohibited
The Russian federal executive agency, Roskomnadzor said that Google was fined for violating the procedure for restricting access to information recognized as prohibited. The announcement mentions that Youtube which is Google’s subsidiary did not limit access to various materials that…
Cleartrip Hacked – Attackers Selling Stolen Data on The Dark Web
Cleartrip Hacked: An Indian travel company, ‘Cleartrip’ owned by Flipkart, and headquartered in Mumbai suffers a massive data breach. Reports say the attackers have gained access to Cleartrip’s internal systems. The personal information of millions of users is being sold…
Which Vulnerability Prioritization Technology Is the Most Accurate?
It’s not possible to patch up all weaknesses that put organizations at risk. New hacking methods, complex multi-cloud environments, and different teams can create an opening for the next cyber breach. Also, attack surfaces change within minutes — making it…
Tor Browser 11.5 Released – Tor Now Automatically Bypasses Internet Censorship
It has been announced that Tor Browser 11.5, one of the major releases from the Tor Project, has been released, offering new features to combat censorship more effectively for users. In order to access sites via the Onion Router network…
New Android Malware on the Google Play Store with Over 3 Million Downloads
A new Android malware called ‘Autolycos’ installed over 3 million times is surfing on the Google Play Store by secretly subscribing users to its premium services. Maxime Ingrao, Security Researcher from Evina found the new android malware ‘Autolycos’, which is…
North Korean Hackers Using H0lyGh0st Ransomware To Attack & Demand 1.2 to 5 Bitcoins
A ransomware operation called H0lyGh0st is being run by North Korean hackers for more than a year now, attacking small businesses across different countries with ransomware. There has been quite a bit of activity on the part of the group…
Ex CIA Programmer Convicted of Leaking ‘Vault 7’ Hacking Tools to WikiLeaks
It has been found that Joshua Schulte, a former programmer for the United States Central Security Agency (CIA), is guilty of leaking top secrets to WikiLeaks by leaking Vault 7. Hacking tools and exploits can be found in vault 7…
Mantis – Behind The Most Powerful Botnet Attack Ever Recorded With 26 Million RPS
Several attacks targeting almost 1,000 Cloudflare customers were traced back to the botnet that was responsible for the largest HTTPS DDoS attack in June 2022. In its analysis of over 3,000 HTTP DDoS attacks against its users, the web performance…
Mantis – Behind The Most Powerful Botnet Attack Ever Recorded With 26 Million Request Per Second
Several attacks targeting almost 1,000 Cloudflare customers were traced back to the botnet that was responsible for the largest HTTPS DDoS attack in June 2022. In its analysis of over 3,000 HTTP DDoS attacks against its users, the web performance…
No-code Development Platforms – Are They Secure?
No-code development platforms can be a great way to build a website, app or other software product. But with these tools, you should always think about security. This is especially true if you’re building an application for the public, like…
Active Directory Penetration Testing Checklist
This article covers Active directory penetration testing that can help for penetration testers and security experts who want to secure their network. “Active Directory” Called as “AD” is a directory service that Microsoft developed for the Windows domain network. Using…
ChromeLoader – New Malware Using a browser Extension to Attack Organizations
New variants of ChromeLoader, a malware that steals information from websites, have been discovered by security researchers at Palo Alto Networks Unit 42, demonstrating how quickly the malware is evolving its features over time. Malware such as ChromeLoader hijacks victims’…
VMware vCenter Server Flaw Let Attacker Exploit to Perform Elevate Privileges Attack
There has finally been a patch released by VMware for an affected version of vCenter Server’s IWA mechanism, eight months after a high-severity privilege escalation vulnerability was disclosed. CrowdStrike Security’s Yaron Zinar and Sagi Sheinfeld reported the vulnerability and it…
Cybercriminals Impersonate as Cybersecurity Firms in Callback Phishing Campaigns
Threat actors have begun impersonating prominent security companies in a new callback phishing campaign. The primary purpose of this campaign is to make the victims download the malware by tricking them with stealthy instructions. In this campaign, CrowdStrike Intelligence is…
Critical Fortinet Flaws Patched – Following Products Affected
Fortinet, a cybersecurity company headquartered in Sunnyvale, California develops and sells cybersecurity solutions, such as physical firewalls, antivirus software, intrusion prevention systems, and endpoint security components. Recently, the company has issued security fixes for the multiple products that affect its…
Common API Security Risks and How to Mitigate Them
Though central to innovation in the app-driven digital ecosystem, APIs or Application Programming Interfaces expose more data and endpoints than traditional web apps by nature, making them lucrative targets to attackers. In a bid to promote enhanced API security, OWASP…
Hackers Steal $540 Million From Axie Infinity Using a Fake Job Offer on LinkedIn
During the month of March 2022, one of Axie Infinity’s former employees became the victim of a fake job offer on LinkedIn and applied for the role. This caused the Ronin Bridge to be hacked for $540 million, resulting in…
ZTNA – An Enterprise Game Changer For Securing Remote Access to IoT & BYOD
Internet networks have expanded far beyond the world of traditional desktop computers. Today, we rely on Google Nest to raise or lower the temperature in our house, on Alexa to play music just by shouting the name of the song…
Beware!! LNK Worm – A Raspberry Robin Malware Attacking Windows Devices
Researchers from Cybereason Global Security Operations Center (SOC) Team, one of the world’s leading cybersecurity companies, have discovered a new Windows worm called Raspberry Robin. Through removable USB devices, the malware spreads from one computer to another. A malicious DLL…
Vulnerability in Honda Cars Let Hackers Unlock & Start Remotely
In nearly all Honda models, hackers were able to open the doors and start the car remotely. A remote keyless entry system is often fitted to modern vehicles, allowing for effortless access to the vehicle. A remote keyless entry system…
A Complete Guide to Perform External Penetration Testing on Your Client Network | Step-by-Step Methods
This write-up walks us through one of my many journeys in my external penetration testing and how I compromised the organization in this write-up. After executing security assessments (e.g. Penetration Testing, Red Teaming, etc.), I make it a habit to…
Most Important Network Penetration Testing Checklist
Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall…
SHI Hacked – IT Service Giant Breached Via Professional Malware Attack
SHI International Corp., formerly called Software House International, is a privately-owned provider of technology products and services, headquartered in Somerset, New Jersey. On July 4th, SHI was hit by a professional malware attack that indeed caused various disruptions. SHI has…
IT Service Giant SHI International Hit By Professional Malware Attack
SHI International Corp., formerly called Software House International, is a privately-owned provider of technology products and services, headquartered in Somerset, New Jersey. On July 4th, SHI was hit by a professional malware attack that indeed caused various disruptions. SHI has…