14 New Vulnerabilities Uncovered In Linux Powered Embedded Devices

On Tuesday 14, the cybersecurity researchers of Claroty and JFrog have detected 14 new vulnerabilities in the BusyBox Linux utility. BusyBox is one of the most extensively used Linux software suites, and there are several world’s leading operational technology (OT) and Internet of Things (IoT) devices that use BusyBox. These vulnerabilities could be exploited to […]

Couple sold nuclear warship data hidden in peanut butter sandwich

The former Navy Nuclear engineer and his wife used a bubble gum package and peanut butter sandwich to hide SD card with sensitive data and sell it to undercover FBI agents. According to a press release from the US Department of Justice (DoJ), the FBI and the Naval Criminal Investigative Service (NCIS) collaborated to arrest […]

Top 3 Ways to Find a Hidden File on a Mac

Mac computers often have hidden files that you can’t see. Find out the practical ways to find and view the articles with ease in this article.  Macbooks often have files, directories, and folders in the system backend that maintain smooth functionalities. These files are sensitive and might cause severe system issues if the user alters, […]

Whitehat hacker shows how to detect hidden cameras in Airbnb, hotels

The Whitehat hacker and IT security researcher Marcus Hutchins, who saved the world from the WannaCry ransomware attack, has shared simple yet useful tips on his TikTok detailing how you can detect hidden cameras in an Airbnb or a hotel room. There’s no doubt that the demand for home rental services like Airbnb is on […]

25 BadAlloc vulnerabilities affects BlackBerry QNX RTOS used by over 195 million vehicles and embedded systems in different industries. Patch quickly

In a security report, BlackBerry announced that its QNX Real Time Operating System (RTOS) is affected by a vulnerability known as BadAlloc. Tracked as CVE-2021-22156, this set of flaws could be exploited for remote threat actors to deploy denial of service (DoS) attacks and remote code execution. QNX RTOS is used in a wide range […]

macOS Malware Added New Weapons to Its Arsenal To Attack Google Chrome & Telegram

The security researchers of Trend Micro have recently detected that the XCSSET malware that has been outlined to attack the macOS operating system got updated.  The analysts noted that the new updated version consists of a new feature, that enables the stealing of private data from different applications, which also includes the Google Chrome browser […]

REvil Ransomware Gang Suddenly Disappear – Dark Web Sites Are Down

REvil is one of the well-known Ransomware Gangs from Russia which is popular for its earlier and recent ransomware attacks. Apart from this, the REvil ransomware gang mainly targets political figures and big tech companies. However, all the websites that were associated with the REvil ransomware group have currently disappeared from the Internet.  According to […]

Pakistan-Linked Hackers Added New Windows Malware to Its Arsenal

Cybercriminals with suspected ties to Pakistan continue to rely on social engineering as a crucial component of its operations as part of an evolving espionage campaign against Indian targets, according to new research. The attacks have been linked to a group called Transparent Tribe, also known as Operation C-Major, APT36, and Mythic Leopard, which has […]

HOW TO DETECT HIDDEN CAMERAS OR SPY CAM IN A ROOM

Many users ignore it, but by using their laptop camera or any other camera with a WiFi connection, their MAC address will become visible to anyone on the Internet. Also, network security experts from the International Institute of Cyber Security (IICS) mention that it is possible to detect multiple data from a user even if […]

SharpHide – Tool To Create Hidden Registry Keys

Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null terminated) registry key. This works by adding a null byte in front of the UNICODE_STRING key valuename.More info about this technique can be found in the following whitepaper: https://github.com/ewhitehats/InvisiblePersistence/blob/master/InvisibleRegValues_Whitepaper.pdfThe tool uses the following registry path in which […]

How To View Hidden Files On MacOS Using Simple Steps?

It’s not just you, we all want to know why the Mac system takes up so much of space. I am curious about it, however, it could be life and death for users who are about fill up their macOS disk storage. Now, there are several ways to approach the situation — You can use […]

SharpHide: Tool to create hidden registry keys

SharpHide Just a nice persistence trick to confuse DFIR investigation. Uses NtSetValueKey native API to create a hidden (null-terminated) registry key. This works by adding a null byte in front of the UNICODE_STRING key… The post SharpHide: Tool to create hidden registry keys appeared first on Penetration Testing.

Titanium APT Hackers Inject New Hidden Backdoor on Windows Using Fileless Technique

A new wave of malware attack strikes again from the Titanium APT group that infects windows with hidden backdoor by mimicking common legitimate software and fileless technique. Titanium APT is one of the technologically advanced hacking group, they are using the various sophisticated technique to attack the target, and their method of attack makes very […]

FOCA – Find Metadata And Hidden Information In The Documents

  FOCA (Fingerprinting Organizations with Collected Archives)FOCA is a tool used mainly to find metadata and hidden information in the documents it scans. These documents may be on web pages, and can be downloaded and analysed with FOCA. It is capable of analysing a wide variety of documents, with the most common being Microsoft Office, […]

Beware! Uninstall These 17 Malware-Ridden iOS Apps Right Now

Malware-ridden apps are common in the Android Play Store, but it seems that Apple is catching up quick. The App Store has also been affected by Clickware apps that are a threat to your personal data. As pointed out by the mobile security firm Wandera, there are 17 apps on the Apple App Store that […]

TheTick – A simple embedded Linux backdoor

A simple embedded Linux backdoor. Compiling The Tick depends only on libcurl, so make sure you have the corresponding development package. For example on Debian based distributions you would do the following: sudo apt-get install libcurl-dev Once the dependencies are installed just run the makefile: cd src make clean make Once the “make” command has […]