Month: February 2021

Top Software Testing Services

Iran Performing Espionage Campaigns On Dissidents

As per CheckPoint, a cybersecurity company, over 1000 dissidents and expats are being targeted by two separate surveillance campaigns being operated in cyber-space by Iran. CheckPoint researchers explained that the campaigns were initiated against people in Iran and other 12 different nations involving the US and UK. Also, the two groups behind the campaigns were…
Read more

Android Devices Now Being Targeted By LodaRAT Windows

A former Windows RAT (Remote Access Trojan) that had the abilities of credential-stealing has now been upgraded and its scope has been widened to cover and target Android device users to increase the attacker’s espionage motives. Researchers from Cisco Talos, in a blog post, said that “The developers of LodaRAT have added Android as a…
Read more

Researchers Found Pakistan Officials Being Targeted By New Android Spying Campaign

Researchers from Lookout discovered two new Android surveillanceware families that have been targeting military, nuclear/atomic, and political entities of Pakistan and Kashmir as a component of a pro-India, which is a nation-backed/state-sponsored hacking operation/campaign. The malwares named Hornbill and Sunbird imitate genuine or apparently harmless administrations to cover its tracks, just to subtly gather SMSs,…
Read more

Government Agencies Of UAE & Kuwait Being Spied On By Iranian Hackers Via Screen Connect

A new research found out that the Iranian threat actors are targeting the government agencies of the UAE and Kuwait as a part of their new cyberespionage operation, utilizing ScreenConnect being distributed via phishing emails. The ScreenConnect is a remote desktop software application, which is now known as ConnectWise Control, that supports unattended access and…
Read more

The Recent Water Treatment Facility Hack Was A Result Of Poor Password Security

New subtleties have arisen about the remote PC interruption at a Florida water treatment plant, featuring an absence of satisfactory safety efforts necessary to make the critical framework conditions impenetrable. The attack/breach which took place last Friday included an ineffective endeavor with respect to an enemy to escalate sodium hydroxide levels in the water supply…
Read more

$100 Million Of Cryptocurrency Stolen By 10 SIM Swappers, Now Arrested

Ten individuals having a place with a criminal organization have been arrested regarding a series of SIM-swapping assaults that brought about the robbery of more than $100 million by taking control over the accounts of mobile phones of prominent personalities in the U.S. The year-long investigation that was conducted by Europol was together led by…
Read more

What Financial Organizations Should Consider to Avoid/Prevent Cyber Threats

Banks and Financial organizations/institutions due to their access to sensitive and confidential client data are an ideal objective for cyber attackers, particularly in the present powerful and active environment. With numerous representatives working remotely during the pandemic, the assault surface has expanded rapidly and massively, making employees simpler targets. As per Boston Consulting Group, organizations…
Read more

Severity Differences Between SSRF & XXE

SSRF stands for Server-Side Request Forgery and is a type of attack in which a vulnerable server is forced by the attacker/hacker to trigger unwanted malicious requests to the third-party servers and/or to internal resources. XML stands for XML External Entity and is a type of attack that is performed over an application that parses…
Read more

Best Practices For DevSecOps

A simple DevSecOps definition is that it is short for development, security, and operations. Its  mantra is to make everyone accountable for security with the objective of implementing security decisions and actions at the same scale and speed as development and operations decisions and actions. Every organization with a DevOps framework should be looking to…
Read more

Preventing Risks From Subdomain Takeover – Cloud Exploits

33 billion records were leaked in 2018 and 2019 because of inappropriate cloud security. Since 2019, an expansion of more than 300% in the number of penetration tests performed against cloud environments. During cloud penetration tests, configuration errors are regularly discovered which could prompt significant issues, for instance, misconfigured openly visible AWS S3 storage buckets.…
Read more