Browsing tag

Security

MSP vs MSSP: What’s The Difference?

MSPs refer to managed service providers, who offer a wide range of services to their clients. MSSPs, on the other hand, are managed security service providers, who focus exclusively on cybersecurity. People often conceptualize MSPs as ‘jack of all trades’ providers, while MSSPs are seen as more specialized and focused. However, this is not always […]

T-Mobile’s latest data breach exposed users to SIM swapping attacks

T-Mobile is the only telecom giant to suffer at least three known data breaches in 2021. Another day, another data breach at T-Mobile – This time, the Bellevue, Washington-based telecom giant has acknowledged suffering a cyberattack in which the personal information of “a very small number of customers” was accessed by unknown attackers. What happened? […]

9-year-old Windows flaw abused to drop ZLoader malware in 111 countries

The vulnerability was identified and fixed in 2013 but in 2014 Microsoft revised the fix allowing Malsmoke hackers in 2022 to spread ZLoader malware. Israel-based cybersecurity firm Check Point Research has been assessing a sophisticated infection chain since Nov 2021. Researchers have now published their report, stating that a new ZLoader malware campaign is underway […]

Software flaws in walk-through metal detectors made them hackable

Walk-through metal detectors manufactured by well-known U.S.-based firm Garett are vulnerable to remote attacks, according to Cisco Talos. Researchers at Cisco Talos discovered as many as nine vulnerabilities in walk-through metal detectors manufactured by well-known U.S.-based firm Garett. According to researchers, if these flaws are exploited, the attacker can take the detectors offline, monitor, read, and modify […]

Error prompted LastPass to send false breach alerts to users

One of the users who received an email alert from LastPass stated that it warned them of an unauthorized login attempt using their account’s master password. LastPass password manager users were shocked when they received alerts about their accounts getting compromised during a hack attack. The company released a statement on December 28th stating that […]

Research claims Samsung Galaxy Store apps are spreading malware

According to Max Weinbach of Android Police, “Samsung is hosting literal malware on the Galaxy Store.” It is becoming harder and harder to evade online scams, especially those involving Android applications. According to an analysis from Android Police’s Max Weinbach, Samsung is hosting several infected Android apps on its official Galaxy Store that may insert […]

Everything You Need to Know About Amazon Fire TV Stick

We have been bombarded left, right, and center for some time now with streaming services, TV subscriptions, and other entertainment technology. It can be hard to keep up with the latest offerings or even fully understand what they all do with such an overload. One such technology which is incredibly popular is the Amazon fire […]

Understanding Software Supply Chain and How to Secure It

Some organizations and developers use third-party resources rather than writing software from scratch. Engineers may speed up development and save manufacturing costs by adopting pre-built libraries and open source components, allowing them to bring products to market faster. As a result, businesses need to account for software occurring outside of their walls and networks in […]

Gumtree exposed users’ personal and GPS location via source code

All a user required was to open Gumtree’s website and press the F12 button on Chrome or Firefox browsers to view users’ personal data. A UK-based classified site and used goods marketplace, Gumtree, exposed the home addresses of its users in its webpages source code. Gumtree is among the top 30 sites in Britain, and […]

4 Ways Cybercriminals Exploit Remote Teams

Working from home (WFH) is not a piece of cake especially when cybercriminals exploited every possible vulnerability to break into your workstation. Cybercriminals are improving and refining their methods for preying on people’s anxieties about COVID-19. As a result, working from home has opened the door to new types of data theft. A lack of […]

Avast found backdoor in US Federal Agency Network

Avast Threat Intelligence Team stated that it tried to notify the agency about the intrusion but didn’t receive any favorable response, which is why it decided to disclose its findings. Czech security firm Avast reported that a backdoor was identified in a US federal agency’s network, the United States Commission on International Religious Freedom (USCIRF). […]

Two backdoors detected in Auerswald VoIP ystem

The backdoors were detected during penetration testing by RedTeam Pentesting GmbH. On December 20th,  it was reported that a backdoor was found in the network of a US Federal Agency. Now, RedTeam Pentesting researchers have identified multiple backdoors in a commonly used VoIP (voice over Internet protocol) appliance made by the German telecom hardware manufacturer […]

5 Ways to Ensure Your Child’s Online Safety

The internet is an integral tool for modern life. It allows people to connect, store enormous amounts of data, and conduct the business of daily life from the comfort of home. The internet provides a lot of good to the world — but for inexperienced users, it can also present danger. Below are some tips […]

Hackers steal $120m from Badger Defi and $30m from MonoX

MonoX security breach was caused by a bug in smart contracts meanwhile Badger is still investigating the incident. Two DeFi projects BadgerDAO and MonoX are the latest victims of security breaches in which hundreds of millions of dollars worth of cryptocurrency has been stolen by hackers. It is worth noting that both projects became victims […]

VPS Hosting Vs. Dedicated Servers – Which Is Better?

When you’re an owner of a particular brand or service, it is highly likely you’ll create a website that will serve as an advertisement for everything that you provide. If done the right way, as time goes by, this site is supposed to attract lots of new visitors. If that happens, you should think of […]

5 Ways AI Will Revolutionize Cybersecurity

Artificial intelligence (AI) continues to change nearly every facet of online and offline life, from how we interact with friends and family to the way we do business and protect our identity online. As more of our life becomes digital, AI will need to be leveraged by both individuals and companies to a far greater […]

Ascendex cryptocurrency exchange hacked – $77 million stolen

Ascendex has lost $77 million worth of RC20, BSC, and Polygon tokens to cyberattack. A popular cryptocurrency exchange, Ascendex has become the latest victim of a security breach, letting hackers gain control of some of the exchange’s hot wallets. For your information, hot wallets are internet-connected cryptocurrency wallets that owners can access through a private […]

Fake KPSPico Windows activator tool KPSPico steals crypto wallet data

The malware is dubbed CrypBot is essentially an information stealer that can obtain credentials for cryptocurrency wallets, browsers, credit cards, browser cookies, and capture screenshots from compromised devices. Cybersecurity solutions provider Red Canary revealed in its recent blog post that a malicious KMSPico installer is carrying malware that can steal user information from cryptocurrency wallets, […]

Microsoft disrupts activity of Chinese hackers by seizing 42 websites

Dubbed Nickel by Microsoft; the group of Chinese hackers was actively using the websites for intelligence gathering from thanks tanks, human rights organizations, and government agencies in 29 countries. The Microsoft Digital Crimes Unit disrupted the activities of a hacking group based in China after a federal court allowed the company to seize the websites […]

SMA 100 flaws in SonicWall VPN expose devices to remote takeover

If exploited, an unauthenticated, remote attacker can execute code as a “nobody user” in the device meaning attacker would get root access and gain full control of the device. SonicWall, a renowned network security vendor is urging users to immediately update their SMA 100 [PDF] series devices with the latest version after detecting multiple security […]

Kali Linux 2021.4 released with Samba compatibility, Apple M1 support, 9 new tools

Kali Linux 2021.4 comes with several improved features, including Samba compatibility, better Apple M1 support, switching package manager mirrors – Download Kali Linux 2021.4 now. Offensive Security has finally released Kali Linux 2021.4. The release has been grabbing headlines for the array of new capabilities and tools embedded with. Here’s a look at what’s included […]