BazarLoader Windows Malware Let Hackers Allow Backdoor Access & Network Reconnaissance

A BazarLoader Windows malware campaign has been detected recently by the security firm, Unit42 of Plaalto Networks that was hosting one of their malicious files on Microsoft’s OneDrive service. This BazarLoader Windows malware enables the threat actors backdoor access and network reconnaissance. After the revelation of this incident, a former senior threat intelligence analyst of […]

SSID Stripping flaw lets hackers mimic real wireless access points

SSID Stripping has emerged as a significant threat because it impacts almost all software platforms, including MS Windows, macOS, Apple iOS, Ubuntu, and Android. A Team of researchers at AirEye in collaboration with Technion – Israel Institute of Technology’s Computer Science faculty, have discovered a vulnerability that changes a network’s name (which is actually SSID […]

How to use VPN to access blocked websites?

Governments and regimes across the globe use censorship as a tool to control the flow of information. This article highlights how one can use VPN to access blocked websites. If your country censors the internet and blocks sites like Facebook, Twitter, or YouTube then a VPN is what you need. When a user visits a […]

Shared clinical workstation security and access

The shared clinical workstations in the healthcare sector are often chaotic and messy. They are used by physicians for nearly everything, from logging into the EHR system to scheduling surgery. With so much going on in such a fast-paced industry, IT teams need to be vigilant and aware of security risks. Risks of Sharing Clinical […]

Whitehat hackers accessed primary keys of Azure’s Cosmos DB customers

According to researchers, “This is the worst cloud vulnerability you can imagine.” A critical security vulnerability present in Microsoft’s Azure cloud computing database left the sensitive data of thousands of customers exposed. These customers included several Fortune 500 companies. The vulnerability existed in Microsoft Azure’s flagship database service Cosmos DB for approximately two years. The […]

Network access to Pakistan’s top fed agency FBR sold on Russian forum

FBR, Pakistan’s IRS, has acknowledged the data breach and called it out as cyber-terrorism on Pakistan’s independence day. The Federal Board of Revenue (FBR) of Pakistan (fbr.gov.pk) has suffered a large-scale cyber attack. This was revealed after a group of unknown hackers were found selling network access to the agency with more than 1500 computer systems on a Russian […]

Hackers could access photos, videos without unlocking your phone

The vulnerability existed in the Facebook Messenger Rooms video chat feature and exposed Android smartphone users to intrusion. Nepalese security researcher Samip Aryal has identified a security vulnerability in the Facebook Messenger Rooms video chat feature that lets attackers access any user’s private Facebook photos and videos or submit posts on their behalf.  Astonishingly, this feat can […]

Hackers gained access to the Office 365 email accounts of at least 80% of employees working in the U.S. attorneys’ offices via SolarWinds

The Department of Justice (DOJ) has revealed that the Microsoft Office 365 email accounts of employees at all U.S. prosecutors’ offices were compromised by Russia’s Foreign Intelligence Service (SVR) during the SolarWinds supply chain attack: “This threat group has access to compromised accounts from approximately May 7 to December 27, 2020.” , the statement said. […]

Android malware Vultur uses VNC remote access to steal passwords

Cybersecurity specialists report the detection of a new Android-based remote access Trojan (RAT) that is capable of recording the screen of the affected user in order to steal sensitive information such as online banking credentials and other access keys to perform fraudulent activities. This malware was identified as Vultur and was distributed through the official […]

3 critical vulnerabilities in biometric access devices allow hackers to open doors remotely like in movies

Cybersecurity specialists report the discovery of multiple vulnerabilities in biometric access control devices developed by French multinational IDEMIA. According to the report, successful exploitation of these vulnerabilities would allow threat actors to deploy remote code execution (RCE), denial of service (DoS), and arbitrary file writing attacks. Vladimir Nazarov, a researcher at Positive Technologies, mentions: “Cybercriminals […]

Facebook fires 52 employees for abusing their access to stealing user data and spying multiple women profiles and location

Facebook announced its decision to fire 52 employees for using their privileged position on the platform to access users’ private data. Apparently, these individuals even tried to get the exact location of some women they were curious or attracted to. Using their access to large amounts of user data through Facebook’s internal systems, the fired […]

Critical RCE Flaw in ForgeRock Access Manager Under Active Attack

Cybersecurity agencies in Australia and the U.S. are warning of an actively exploited vulnerability impacting ForgeRock’s OpenAM access management solution that could be leveraged to execute arbitrary code on an affected system remotely. “The [Australian Cyber Security Centre] has observed actors exploiting this vulnerability to compromise multiple hosts and deploy additional malware and tools,” the […]

2 critical vulnerabilities in Fortinet’s FortiWeb web application firewall can give cyber criminals access to your applications

Cybersecurity experts report the discovery of a critical vulnerability in FortiWeb, the web application firewall (WAF) of the technology firm Fortinet. The vulnerability could be exploited for arbitrary code execution, which poses a critical risk to affected system operators, especially if the flaw is chained to other recently discovered bugs. Positive Technologies researcher Andrey Medov […]

Critical server side request forgery (SSRF) vulnerability in GitLab can give attackers access to compromised servers

GitLab’s security teams announced the fix of a server-side request forgery (SSRF) flaw recently reported by an independent researcher. As some users will recall, an SSRF attack occurs when a threat actor forces a vulnerable server to connect to internal services within the infrastructure of the maliciously targeted organization. In December 2020 the researcher known […]

Hackers Exploited Fortinet Vulnerabilities to Gain Access of a U.S. Municipal Government Webserver

Recently, APT group or the state-sponsored hackers have exploited the vulnerabilities in an unpatched Fortinet VPN to compromise the webserver of a U.S. municipal government web server, as reported by the FBI (Federal Bureau of Investigation). The APT (Advanced Persistent Threat) hackers created new servers, domain controllers, and workstation user accounts just after gaining access […]

How Apple Gave Chinese Government Access to iCloud Data and Censored Apps

In July 2018, when Guizhou-Cloud Big Data (GCBD) agreed to a deal with state-owned telco China Telecom to move iCloud data belonging to Apple’s China-based users to the latter’s servers, the shift raised concerns that it could make user data vulnerable to state surveillance. Now, according to a deep-dive report from The New York Times, […]

BigBasket security leak also impacted thousands of Flipkart users; access credentials exposed

Security incidents sometimes transcend affected organizations, reaching levels of impact that IT security teams cannot foresee. This is the case with the data breach in BigBasket, which resulted in the leaking of sensitive information belonging to Flipkart users nearly seven months after the initial incident. As some users will remember, BigBasket suffered a data breach […]