Month: January 2021

Top Software Testing Services

A New Github-hosted Malware Strain Abuses Github And Imgur

A new strand of malware strain has been found that utilizes word document files embedded with macros for downloading GitHub facilitated PowerShell scripts. This downloaded PowerShell script is further used to decrypt the Cobalt Strike Script on Windows by downloading a genuine image file from Imgur – an image hosting service. A lot of researchers…
Read more

U.S. Request To Extradite WikiLeaks Founder Julain Assange, Rejected By British Court

A request from the U.S. government to extradite WikiLeaks founder Julian Assange on the charges of illegally acquiring and sharing confidential information regarding national security was denied by the British Court. Judge Vanessa Baraister rejected the extradition of Julian Assange based on his poor mental conditions related to depression making him a suicide risk and…
Read more

Leaked Data of 10 Crore Indian Card Holders Is Being Sold On Dark Web After Juspay Faces a Cyber Attack In August

The data of 10 crore users have been leaked and is being sold on the dark web. The number of users affected by the leaked data can be considered to be the biggest data leak in Indian history. The data was leaked from the servers of Juspay. Juspay is a mobile payments solution company that is…
Read more

Microsoft’s Source Code Accessed By the Hackers Included In SolarWinds Cyber Attack, Claims Microsoft

Microsoft revealed on Thursday, that the hacker group responsible for the cyberattack on SolarWinds was somehow able to cut in their corporation and viewed some of its source codes. Microsoft also mentioned that they have discovered some form of unusual activities in some of their internal accounts and when investigated, they were able to detect…
Read more

Pune-Headquartered Engineering Company Defrauded By A “Man-In-The-Middle” Cyber Attack

A Pune-based multinational engineering company was tricked and lost 56,000 euros i.e. more than Rs 50 Lakh via a cyber attack in which officials of the company becomes victim via fraudulent emails termed as the “man-in-the-middle” cyber attack. A “man-in-the-middle” cyber attack generally takes place in a business transaction where email accounts of either both…
Read more

Hackers Using Smart Home Devices To Live Stream Swatting Attacks

The US FBI (Federal Bureau of Investigation) recently stated that the attackers have now started to take control over smart home devices and security systems via breached emails and passwords and are using them to live stream the Swatting events. Swatting is a hoax call (a call made to trick someone for malicious purposes) made…
Read more

6 Questions Hackers Use As A Base To Select A Resource To Exploit

Studying the “Hacker Logic” can help us to know how hackers choose their target and how can we make our defenses stronger, explained at Randori by David “moose” Wolpoff. A huge shift towards the cloud can be easily noticed in the past few years. Another shift to remote working enforced by the Covid-19 pandemic situation…
Read more