Browsing tag

cybersecurity

New FaceTime Bug Lets Callers Hear and See You Without You Picking Up

If you own an Apple device, you should immediately turn OFF FaceTime app for a few days. A jaw-dropping unpatched privacy bug has been uncovered in Apple’s popular video and audio call app FaceTime that could let someone hear or see you before you even pick up their call. The bug is going viral on […]

Cyber Attack Targets French Engineering Consultant Altran

Cybersecurity experts have warned that the massive data breach that might be the biggest ever posted on the internet is just the beginning. The trove of sensitive information that was published to the internet this week, allowing anyone to download a collection of hundreds of millions of email addresses and passwords. They are likely to […]

Researchers Release Tool That Finds Vulnerable Robots on the Internet

A team at a robot cybersecurity startup has released a free, open-source tool for information security professionals to help them easily ‘footprint’ and detect unprotected robots, not only connected to the Internet, but also to the industrial environments where they operate. Dubbed “Aztarna,” the framework has been developed by Alias Robotics, a Spanish cybersecurity firm […]

New Exploit Threatens Over 9,000 Hackable Cisco RV320/RV325 Routers Worldwide

If the connectivity and security of your organization rely on Cisco RV320 or RV325 Dual Gigabit WAN VPN routers, then you need to immediately install the latest firmware update released by the vendor last week. Cyber attackers have actively been exploiting two newly patched high-severity router vulnerabilities in the wild after a security researcher released […]

Japan Will Hack Its Citizens’ IoT Devices To ‘Make Them Secure’

The Japanese government has passed a new law amendment that will allow officials to hack into citizen’s Internet of Things devices to compile a list of devices that are prone to hacking. The government will attempt to break into the devices as a part of a survey that will be carried out by the National […]

What Can We Learn From The Spear Phishing Exploits Against Telstra

Cybersecurity researchers have warned the public that there is a convincing phishing email pretending to be coming from Telstra, the Telco giant. The sample provided falls into the category of ‘spear phishing’, which means only those that are current customers of Telstra received it. Using clever formatting tricks, the email looks the same as a […]

GandCrab ransomware and Ursnif virus spreading via MS Word macros

Security researchers have discovered two separate malware campaigns, one of which is distributing the Ursnif data-stealing trojan and the GandCrab ransomware in the wild, whereas the second one is only infecting victims with Ursnif malware. Though both malware campaigns appear to be a work of two separate cybercriminal groups, we find many similarities in them. […]

China Blocks Microsoft’s Bing Search Engine, Despite Offering Censored Results

China has blocked Microsoft-owned search engine Bing, the company confirmed after receiving complaints from users throughout the country who took to social media beginning late Wednesday to express concerns. So, Bing becomes the latest service to be shut down by Chinese government behind its so-called Great Firewall of China, which blocks thousands of websites originating […]

New Trend? Antivirus Software Exploited To Launch Privilege Escalation Attack

How can cybercriminals penetrate a network or computer if there are security software in place to prevent it? Some cyber criminals have the answer, attack the very software used for securing the computer/network. That is the exact scenario that happened with ZoneAlarm antivirus, becoming the victim of a very clever vulnerability attack, as reported by […]

Millions of PCs Found Running Outdated Versions of Popular Software

It is 2019, and millions of computers still either have at least one outdated application installed or run outdated operating systems, making themselves vulnerable to online threats and known security vulnerabilities/exploits. Security vendor Avast has released its PC Trends Report 2019 revealing that millions of users are making themselves vulnerable to cyber attacks by keeping […]

Moody’s will include cybersecurity risks in corporate credit ratings

The rating agency will evaluate the propensity of large organizations to suffer information security incidents A data breach, depending on the magnitude of the incident, and its corresponding fines or infringements, could sentence to death an organization, commented experts in network security and ethical hacking from the International Institute of Cyber Security. Moody’s, the investment […]

DHS Orders U.S. Federal Agencies to Audit DNS Security for Their Domains

The U.S. Department of Homeland Security (DHS) has today issued an “emergency directive” to all federal agencies ordering IT staff to audit DNS records for their respective website domains, or other agency-managed domains, within next 10 business days. The emergency security alert came in the wake of a series of recent incidents involving DNS hijacking, […]

Chinese Hacker Publishes PoC for Remote iOS 12 Jailbreak On iPhone X

Here we have great news for all iPhone Jailbreak lovers and concerning one for the rest of iPhone users. A Chinese cybersecurity researcher has today revealed technical details of critical vulnerabilities in Apple Safari web browser and iOS that could allow a remote attacker to jailbreak and compromise victims’ iPhoneX running iOS 12.1.2 and before […]

Someone Hacked PHP PEAR Site and Replaced the Official Package Manager

Beware! If you have downloaded PHP PEAR package manager from its official website in past 6 months, we are sorry to say that your server might have been compromised. Last week, the maintainers at PEAR took down the official website of the PEAR (pear-php.net) after they found that someone has replaced original PHP PEAR package […]

Users have until February 13th to stop using TLS-SIN-01 in Let’s Encrypt

Due to security incidents, certifying authorities have decided to end the implementation of this protocol Nearly year after a security incident allowed malicious users to claim encryption certificates from domains that did not belong to them, the certifying authority has decided to terminate the TLS-SIN-01 protocol lifecycle, as report by network security and ethical hacking […]

Critical RCE Flaw in Linux APT Allows Remote Attackers to Hack Systems

Just in time… Cybersecurity experts this week fighting over Twitter in favor of not using HTTPS and suggesting software developers to only rely on signature-based package verification just because APT on Linux also does the same. Just today, a security researcher revealed details of a critical remote code execution flaw in Linux APT, exploitation of […]

New malware found using Google Drive as its command-and-control server

Since most security tools also keep an eye on the network traffic to detect malicious IP addresses, attackers are increasingly adopting infrastructure of legitimate services in their attacks to hide their malicious activities. Cybersecurity researchers have now spotted a new malware attack campaign linked to the notorious DarkHydrus APT group that uses Google Drive as […]