Blog

DJI Drone Data Exposed due to Cloud Infrastructure Vulnerability

DJI Drone Data Exposed due to Cloud Infrastructure Vulnerability

DJI makes some of the most mainstream quadcopters available, yet its items have more than once drawn investigation from the United States government over protection and security concerns. Most as of late, the Department of Defense in May restricted the buy of customer rambles made by a bunch of merchants, including DJI. Presently DJI has fixed...
Continue Reading
GPU Channel

GPU Channel Attacks Pave Way for Data Theft

PC researchers at the University of California, Riverside have uncovered out of the blue how effectively assailants can utilize a PC’s illustrations handling unit, or GPU, to keep an eye on web movement, take passwords, and break into cloud-based applications. Marlan and Rosemary Bourns College of Engineering software engineering doctoral understudy Hoda Naghibijouybari and post-doctoral specialist...
Continue Reading
Aadhaar information leaks

When Aaadhaar leaks are real despite denial: This time an LPG Company did it

What is new? This time a record number of 6.7 Million records were leaked through an LPG company. Not necessarily that they did it, but their complacency on their cyber security infrastructure made them vulnerable to data theft. Take note that Aadhar data were leaked through this company. It makes sense that if you cannot hack...
Continue Reading
Evernote for Windows

Evernote Flaw Allowed Hackers to Create XSS Vulnerability and Steal Data

A researcher who uses the online moniker Sebao identified a stored XSS flaw in the Evernote app. He found that when a picture was added to a note and later renamed, JavaScript code could be added instead of a name. If the note was shared with another Evernote user, the code would get executed when the...
Continue Reading
Artificial Intelligence

How Artificial Intelligence Will Become Weaponized in Cyber Attacks

On Thursday, analysts from Darktrace (.PDF) said that the present risk scene is loaded with everything from content kiddies and shrewd assaults to cutting edge, state-supported ambushes, and in the last sense, assaults keep on developing. Be that as it may, for each refined assault presently being used, there is the potential for further advancement through...
Continue Reading
Macos Malware

Macos Malware Releases an MITM Attack

Malware creators are continually searching for new and inventive approaches to stay away from location and increment benefits, so a report that an evidently new method was being conveyed against macOS clients a week ago made them start up our Virtual Machines to perceive what our foes had concocted this time.   Old Dog, New Tricks...
Continue Reading
DNS burrowing

MTN Vulnerability Could Allow Hackers To Steal Data

A security analyst as of late reached MyBroadband to report a weakness in the MTN arrange that could enable programmers to get free information utilizing DNS burrowing.   The Domain Name System (DNS) is an arrangement of servers on the Internet which empower the interpretation of comprehensible spaces, as mtn.co.za, into Internet Protocol addresses.   Burrowing...
Continue Reading
CryptoJacking

Massive CryptoJacking Carried Out Using Canadian University Network

Malicious cyber criminals have just utilized a Canadian college’s system to do a huge cryptojacking effort. Nova Scotia’s St. Francis Xavier University found the assault a week ago and handicapped its system to remove the assault. The programmers allegedly introduced a malware to direct the assault.   In a statement released on Nov. 4, the university...
Continue Reading
Multiple Hacking Campaigns Detected

Multiple Hacking Campaigns Detected Against Telegram and Instagram via BGP Protocol

The malicious hackrs behind the assaults – regardless of whether state-supported or something else – are concentrating solely on subjects of Iran that utilization either the scrambled informing application or picture sharing administration.   As per the Cisco Talos cybersecurity group, the battles have been dynamic since 2017 and are continuous against about 40 million Telegram...
Continue Reading
BitCoins

Necurs Sextortion Movement Sifted Almost US$150,000 in BitCoins

Two new sextortion movements being appropriated by means of the infamous Necurs botnet have as of late been distinguished by threat security specialists. The malicious con artists behind these fraudulent crusades are focusing on exploited individuals whose information has already been spilled.   The con artists guarantee to have trading off recordings of the person in...
Continue Reading
vulnerabilities

New Bluetooth Protocol Chips Plagued by BleedingBit Bug

Two new zero-day vulnerabilities were found in Bluetooth Low-Energy (BLE) chips, which could uncover numerous endeavor firms from around the globe to remote code execution assaults. The arrangement of vulnerabilities were named as “Bleedingbit“. By abusing the bugs, an aggressor could possibly focus on a helpless framework found 100 to 300 feet away.   BLE is...
Continue Reading
MyFitnessPal

Under Armour’s MyFitnessPal Hacked – User Data Exposed

Another data has surfaced with respect to the Under Armor’s MyFitnessPal application information break. The information rupture that happened in February 2018, has influenced around 3,977,385 Australian clients.   MyFitnessPal lets users monitor their calorie intake and measure it against the amount of exercise they are doing, with a database of more than 2 million foods...
Continue Reading
UAE Cyber Threats

UAE Cyber Threats and How Serious They Are

An aggregate of 276,000 vulnerabilities have been distinguished crosswise over 800,000 web confronting has in the UAE by DarkMatter Group, the provincial digital security consultancy. Its quarterly Cyber Security Report demonstrated that 93 percent of DarkMatter’s appraisals discovered obsolete programming and 83 percent found unsupported programming. The report likewise said that 70 percent of digital occurrence...
Continue Reading
Healthcare industry

42K Clients’ Data Exposed In New Health First Hacking Incident

Health First just uncovered an information rupture that influenced its online application seller. It may have traded off the individual information of around 42,000 clients. The firm guaranteed that the information broke incorporated clients’ Social Security Numbers, locations and dates of birth.   In any case, the social insurance association asserts that no therapeutic data was...
Continue Reading
cryptocurrency mining malware

CryptoJacking Malware Uses Victims’ Machines to Mine CryptoCurrency

Cyber Security researchers have just discovered a new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.   Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation. As the malware increases power consumption, the machine...
Continue Reading
DarkHotel

DarkHotel: NoKor Hacking Elite Targeting IE Scripting Engine

The stealthy North Korean APT group dubbed DarkHotel, otherwise known as APT-C-06, Fallout Team, SIG25, and so on, has been progressively focusing on Internet Explorer (IE) scripting motor. Security specialists as of late found that DarkHotel made new endeavors for two more seasoned vulnerabilities influencing the Internet Explorer scripting motors.   Despite the fact that DarkHotel’s...
Continue Reading
BotNet

New BotNet Army Slowly Spreading Mayhem On The Net

Security specialists have revealed the noxious exercises of another botnet named BCMUPnP_Hunter. It has just subjugated around 100,000 switches and has been unobtrusively becoming in the course of recent months. The botnet is being utilized to convey enormous email crusades and endeavors to interface with webmail administrations.   The botnet’s administrators were spotted utilizing a five-year-old...
Continue Reading
Routers Botnet

100K SoHo Routers Taken Over by A Botnet

A recently found botnet has taken control of an eye-popping 100,000 home and little office switches produced by a range of well-known industry manufacturers, for the most part by misusing a basic weakpoint that has stayed unaddressed on tainted gadgets over five years after it became exposed.   Scientists, who detailed the mass contamination before the...
Continue Reading
Hospital Data Breach

Huntsville Hospital Data Breach

Huntsville Hospital in Alabama is informing work candidates about a data rupture that may have brought about the bargain of their own information. The data rupture happened in May 2018 yet the doctor’s facility came to think about it just in October 2018.   As indicated by the notice letters conveyed by the healing center, the...
Continue Reading
Banking Malware

Metamorfo Banking Malware Attacking Users In Brazil

Two new Metamorfo malspam battles have been spotted by security specialists. The battles have been pushing keeping money malware variations that are fit for taking certifications and card installment information. These battles are particularly focusing on clients of money related foundations in Brazil. As per the security specialists, who found the new assault incidents, the cybercriminals...
Continue Reading
1 2 3 4 15

Categories