Browsing tag

cybersecurity

Attack Monitor – Endpoint Detection And Malware Analysis Software

Attack Monitor is Python application written to enhance security monitoring capabilites of Windows 7/2008 (and all later versions) workstations/servers and to automate dynamic analysis of malware.Current modes (mutually exclusive): Endpoint detection (ED) Malware analysis (on dedicated Virtual Machine) Based on events from: Windows event logs Sysmon Watchdog (Filesystem monitoring Python library) TShark (only malware analysis […]

4 million credit cards used in restaurants for sale in hacking forums

A hacker group has released a new database of stolen payment cards on Joker’s Stash, a popular hacking forum. According to web application security specialists who analyzed the new publication, this time the stolen information appears to be related to the hacking on four major restaurant chains in the US. This new batch appeared on […]

New malware transfers money from your mobile banking app to a hackers’ account

There are currently multiple variants of malware for mobile devices used for different purposes. Digital forensics experts mention that, during the most recent months, an infection campaign has been detected against devices with Android operating system that uses malware to infiltrate the victims’ mobile banking app and extract their assets. In its report, the security […]

Magento Marketplace was hacked; the most insecure platform

Data protection experts reported an intrusion that has impacted Adobe Magento Marketplace users, employed to purchase, sell, and download themes and plugins for Magento-based online stores. Through an email, the company notified its customers, noting that hackers took advantage of a known vulnerability in the Magento Marketplace website to access compromised systems, resulting in unauthorized […]

Palo Alto suffers data breach. Are its customers’ networks secured?

Information security specialists reported that Palo Alto Networks, a major security firm based in California, US, has become victim to a data breach that led to the exposure of personal information from former and current employees. Compromised data include details such as names, dates of birth, and employee social security numbers. Through a private email […]

Security firm Prosegur shuts down operations after ransomware attack

According to ethical hacking specialists, multinational private security firm Prosegur was the victim of a massive ransomware attack that forced the shutdown of operations on its telecommunications platform. The company, based in Spain, acknowledged the incident through a statement published around noon yesterday (local time). As a security measure, the company decided to restrict communications […]

How hotels are being hacked? A method used by cybercriminals

Multiple hotel chain employees constantly receive emails that they should probably ignore, as they could fall victim to a massive phishing campaign targeting the hospitality industry. Cybersecurity specialists from security firm Kaspersky have released a report detailing a hacking campaign identified as RevengeHotels that aims to obtain credit card data from millions of hotel chain […]

ATFuzzer – Dynamic Analysis Of AT Interface For Android Smartphones

“Opening Pandora’s Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones” is accepted to the 35th Annual Computer Security Applications Conference (ACSAC) 2019. https://relentless-warrior.github.io/wp-content/uploads/2019/11/atfuzz.pdf AbstractThis paper focuses on checking the correctness and robustness of the AT command interface exposed by the cellular baseband processor through Bluetooth and USB. A device’s application processor uses […]

XML External Entity (XXE) Injection Payload List

In this section, we’ll explain what XML external entity injection is, describe some common examples, explain how to find and exploit various kinds of XXE injection, and summarize how to prevent XXE injection attacks. What is XML external entity injection?XML external entity injection (also known as XXE) is a web security vulnerability that allows an […]

Cryptocurrency exchange platform Upbit was hacked; $50M USD robbed

Despite some of them have advanced security measures, cryptocurrency exchange platforms remain one of the hackers’ favorite targets. As reported by digital forensics specialists, Upbit, a South Korean-based crypto exchange platform, has been the victim of a cyberattack that led to the theft of 342k Ethereum units, equivalent to $48.5M USD at current exchange rate. […]

This malware infects your device when you watch a Facebook ad

Ethical hacking specialists from security firm ESET report the emergence of a new banking Trojan tracked in multiple locations in Latin America. Identified as Mispadu, this malicious program uses fake McDonald’s ads and phishing emails to trick victims through websites and social media platforms, primarily Facebook. In addition to malicious advertising, it is also possible […]

Critical SQL injection vulnerability affecting phpMyAdmin

Vulnerability testing specialists reported the finding of a security flaw in phpMyAdmin, one of the world’s most widely used MySQL database management applications, present in multiple versions of the tool (from 4.7.7 to 4.9.2). According to the report, this is an executable SQL injection vulnerability through the designer function using a username specially created for […]

Nursing homes affected by ransomware infection. Hackers demand 14M USD payment

Over a hundred nursing homes in the US have had their operations crippled because the company providing them with technology services has become victim of a severe ransomware infection. According to information security specialists, threat actors, allegedly Russian hackers, demand a ransom of more than $14 million USD. The affected company is Wisconsin-based Virtual Care […]

Critical server-side vulnerability in Jira affects cloud deployments; update now

Multiple reports have recently emerged about serious security flaws affecting cloud deployments. This time, digital forensics experts at security firm Palo Alto Networks reported a critical server-side vulnerability in Jira, an issue tracking product of Atlassian Corp. which, if exploited, could expose users’ stored data. To be precise, this is a server-side request forgery vulnerability […]

Corsy – CORS Misconfiguration Scanner

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations. UsageUsing Corsy is pretty simplepython corsy.py -u https://example.comA delay between consecutive requests can be specified with -d option. Note: This is a beta version, features such as JSON output and scanning multiple hosts will be added later. Tests implemented Pre-domain bypass […]

Flan – A Pretty Sweet Vulnerability Scanner By CloudFlare

Flan Scan is a lightweight network vulnerability scanner. With Flan Scan you can easily find open ports on your network, identify services and their version, and get a list of relevant CVEs affecting your network.Flan Scan is a wrapper over Nmap and the vulners script which turns Nmap into a full-fledged network vulnerability scanner. Flan […]

NYPD loses fingerprint database due to malware infection

According to digital forensics specialists, a company that provides IT services to the New York Police Department (NYPD) accidentally disconnected the database of fingerprints for hours, all due to the use of a mini computer infected with a malware variant. One of the employees of this company was installing a digital screen on the facilities […]

37 critical vulnerabilities found in VNC solutions. Patches now available

These are bad news for software programmers worldwide. Vulnerability testing researchers report the finding of 37 security flaws affecting four major implementations of Virtual Network Computing (VNC) open source software. Pavel Cheremushkin, researcher at Kaspersky Labs, was responsible for finding the vulnerabilities in LibVNC, TightVNC 1.x, TurboVNC and UltraVNC products. In his report, the expert […]