Month: October 2020

Top Software Testing Services

Mobile browsers experience vulnerabilities in Address Bar

Mobile browsers experience vulnerabilities in Address Bar

The presence of address bar spoofing vulnerabilities in various smartphone browsers has recently been exposed by cybersecurity company Rapid7. Upon exploitation, these bugs will do significant harm to the multiple users since they won’t even recognize the bogus pages. The seven smartphone browsers, including some common ones, were infected by about 10 different vulnerabilities. Specifically,…
Read more

Bug Bounty In 2020

Bug Bounty and Cybersecurity in 2020

Hacking is rather seen as dangerous or in a bad light. But many hackers make their living out of using their hacking skills for ethical purposes. Bug Bounty refers to the programs organized by companies, software developers and websites to find and report bugs in exchange for recognition and compensation. Bug Bounty Industry Bug Bounties…
Read more

What is a CVE id? How a researcher can get a CVE id?

CVE represents Common Vulnerabilities and Exposures and is alluded to as “a word reference of freely known information security vulnerabilities and exposures.” Currently, MITRE Corporation works under an agreement with the U.S. Dept. of Homeland Security.  Practically speaking, The National Vulnerability Database (NVD) is a database of publicly recognized security vulnerabilities in operation. The CVE…
Read more

Microsoft and MITRE release framework to protect Cyberattacks against AI

Microsoft also unveiled the Adversarial ML Threat Matrix, a tool to help cybersecurity experts plan attacks against artificial intelligence models, in partnership with the MITRE research association and a dozen other organizations, including IBM, Nvidia, Airbus, and Bosch. There is an increase in critical online risks that jeopardize their protection and reputation with the implementation of…
Read more

GravityRAT- Windows spyware adjusted to target macOS, Android

GravityRAT is a bit of malware which is named spyware: it helps cybercriminals to steal certain information from infected computers. It is realized that cybercriminals behind this malware target Windows, macOS, and Android devices. If there is a reason to believe that a computer or cell phone is equipped with GravityRAT, it should be removed…
Read more

OSINT Framework- How to use it?

OSINT Framework, as its name suggests, is a cybersecurity platform, a set of OSINT resources that support the information and data collection activities. This tool is often used for digital footprinting, OSINT analysis, intelligence gathering, and reconnaissance by security researchers and penetration testers. It offers a simple web-based interface that helps you to access various…
Read more

Spyware company FinFisher office raided over illegal exporting of confidential software

FinFisher, a Munich-based German spyware company got raided on the suspicion of illegally exporting their product to foreign countries. FinSpy, a very powerful spying tool used by various governments around the world owned by FinFisher, was found to be used by oppressive and doubtful regimes for spying on opposition parties, journalists and NGO’s which suggests…
Read more

Microsoft October 2020 Patch Tuesday fixes 87 vulnerabilities

Microsoft released its monthly batch of security fixes known as Patch Tuesday on the 13th of October, in which 87 bugs have been patched by the OS manufacturer this month across a wide variety of Microsoft software. Microsoft has released security patches for all supported versions of the company’s Windows operating system, as well as…
Read more

What is Open Source Intelligence (OSINT)- How can I make use of it?

OSINT represents Open Source Intelligence and it is one of the key viewpoints in understanding the cybersecurity awareness that leads the Internet nowadays. The term OSINT originates from numerous many years prior. Indeed, US military offices began utilizing the term OSINT in the last part of the 1980s as they were re-examining the idea of…
Read more

Security experts hacked Apple for 3 months- Here what they found

In the wake of getting some answers concerning Apple’s Bug Bounty Program, a gathering of security scientists — Sam Curry, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes — cooperated and hacked Apple from July 6, 2020, to October 6, 2020. During their commitment, they found several vulnerabilities in key parts of their infrastructure…
Read more