Month: February 2021

Top Software Testing Services

Secret Chats On Telegram Could Be Exposed By Just Sending A Sticker

Details of a presently fixed vulnerability in the Telegram messaging application that might have revealed client’s secret chats, photographs, and videos to remote threat actors were revealed on Monday by cybersecurity researchers. The vulnerabilities were found by an Italy-based Shielder in iOS, Android, and macOS variants of the application. Following the capable revelation, Telegram tended…
Read more

French Organizations Being Targeted By Hackers Via Exploitation of Centreon

Sandworm is a Russia-connected nation-backed threat actor which has been connected to a three-year-long secret campaign to hack casualties by exploiting Centreon, which is a tool for IT monitoring. The French information/data security organization ANSSI in a warning explained that this crusade, which is responsible for penetrating a lot of French organizations, is believed to…
Read more

Cybersecurity Is Lagging When Threats For API Are Multiplying

Investor’s attention is nowadays being grabbed by emerging API-based companies. Forbes, which is an American business magazine, as of late considered the API economy the next big thing. But as they increase, so do security risks and threats. As per the report by Salt Security, 91% of present companies or organizations have encountered an API…
Read more

3 Billion Account Credentials From Gmail, LinkedIn, Bitcoin Have Been Leaked

In the event that you have an account on Gmail and Linkedin, then this news is specifically for you. As per the report by BGR India, a huge vault or repository of the user data breach has been uncovered/exposed and hackers have as of late posted more than 3 billion clients’ credentials online as a…
Read more

MoU Signed By HCL Technologies With IIT-Kanpur For The Development Of Cybersecurity

On Monday, HCL (Hindustan Computers Limited) Technologies, released an update on its newsroom, in which the organization said that they have entered/signed a Memorandum Of Understanding (MoU) with the Indian Institute Of Technology Kanpur (IITK) to collaborate in the sector of cybersecurity. HCL Technologies is an Indian multinational technology company that specializes in information technology…
Read more

Microsoft Believes That Government Intervention In Response To Cyber Attack Would Result In ‘The Fog of War’

Microsoft recently took the open door to alert the central government to be aware of the issues it takes with the proposed critical infrastructure/framework legislation by highlighting a few parts of the Bill that could inadvertently make Australia’s security situation even less secure. The draft legislation being referred to, the Security Legislation Amendment Bill 2020,…
Read more

Access To User’s Email Inboxes Was Being Sold By An Employee Of Yandex

Yandex is a Russian Dutch-domiciled search engine, ride-hailing, and email service provider, who on Friday uncovered a data breach in which email accounts of 4,887 of its users were breached or compromised. The organization accused an anonymous employee of the occurrence of this event, who had been giving unauthorized access to the clients’ email inboxes…
Read more

Telegram’s Feature Secret Chat Stores Self-Destructing Media Files On Shared Device

Telegram, a mainstream popular messaging application, recently fixed a privacy crushing bug in its macOS version of the application that made it conceivable to access the self-destructing video and audio messages or files even after they have vanished from secret chats for a long period of time. The vulnerability was found by the cybersecurity researcher…
Read more

Pre-Valentine Malware Attack Using Phishing Emails To Imposter Well-Known Lingerie & Flower Stores

As Valentine’s Day approaches at the end of this week, a lot of people have recently received order confirmation emails for lingerie and flowers. But actually, these confirmation emails are a part of a spear-phishing assault that will eventually drive casualties to a noxious document or file that will execute the BazaLoader malware. The BazaLoader…
Read more

SaaS Security Posture Management With Misconfigured SaaS Settings

Not all but most of the organizations in today’s world, which is full of cybercriminals and cybercrime groups, are mainly concerned about their cloud security situation or reputation. What’s even more concerning for organizations is the SaaS (Software-as-a-service) Security Posture Management (SSPM). A recent attack faced and revealed by Malwarebytes explained how they were targeted…
Read more