Author: Ninad Mishra

Top Software Testing Services

Online Trackers Are Now Shifting To New Invasive CNAME Cloaking Technique

More and more browser developers are constantly pushing harder to shift to third-party tracking, whereas organizations of advertising technology are now relying on a new DNS method to exploit these defenses resulting in threats and risks to user privacy and web security. A bunch of researchers including Guner Acar, Wouter Joosen, Yana Dimova, Lukasz Olenjnik,…
Read more

Hackers Behind APOMacroSploit Malware Builder Exposed By Researchers

Cybersecurity researchers have revealed another sort of Office malware dispersed as a component of a vindictive email campaign that focused over 80 clients worldwide trying to control casualty machines and take data remotely. The tool dubbed as APOMacroSploit is a macro abuse generator that permits the client to make an Excel document with the capability…
Read more

$1.3 Billion Cryptocurrency Heist Blamed On Three North Korean Hackers By US

On Wednesday, three North Korean hackers were charged by the US Department of Justice for reportedly planning to steal and extort from financial and business organizations, an amount of more than $1.3 billion in form of cryptocurrency and cash. It is believed that three individual hackers are part of a military intelligence organization of North…
Read more

Staying Secure While Using Crypto Wallets

Hot and Cold are two classifications for all sorts of crypto wallets. The Hot wallet is one that stays online or is connected to the Internet. Whereas a Cold wallet is one that is offline or isn’t connected to the Internet. For keeping excessive amounts of crypto coins, Cold wallets are the best option and…
Read more

Cybersecurity Is Lagging When Threats For API Are Multiplying

Investor’s attention is nowadays being grabbed by emerging API-based companies. Forbes, which is an American business magazine, as of late considered the API economy the next big thing. But as they increase, so do security risks and threats. As per the report by Salt Security, 91% of present companies or organizations have encountered an API…
Read more

Microsoft Believes That Government Intervention In Response To Cyber Attack Would Result In ‘The Fog of War’

Microsoft recently took the open door to alert the central government to be aware of the issues it takes with the proposed critical infrastructure/framework legislation by highlighting a few parts of the Bill that could inadvertently make Australia’s security situation even less secure. The draft legislation being referred to, the Security Legislation Amendment Bill 2020,…
Read more

Pre-Valentine Malware Attack Using Phishing Emails To Imposter Well-Known Lingerie & Flower Stores

As Valentine’s Day approaches at the end of this week, a lot of people have recently received order confirmation emails for lingerie and flowers. But actually, these confirmation emails are a part of a spear-phishing assault that will eventually drive casualties to a noxious document or file that will execute the BazaLoader malware. The BazaLoader…
Read more

Android Devices Now Being Targeted By LodaRAT Windows

A former Windows RAT (Remote Access Trojan) that had the abilities of credential-stealing has now been upgraded and its scope has been widened to cover and target Android device users to increase the attacker’s espionage motives. Researchers from Cisco Talos, in a blog post, said that “The developers of LodaRAT have added Android as a…
Read more

The Recent Water Treatment Facility Hack Was A Result Of Poor Password Security

New subtleties have arisen about the remote PC interruption at a Florida water treatment plant, featuring an absence of satisfactory safety efforts necessary to make the critical framework conditions impenetrable. The attack/breach which took place last Friday included an ineffective endeavor with respect to an enemy to escalate sodium hydroxide levels in the water supply…
Read more

Severity Differences Between SSRF & XXE

SSRF stands for Server-Side Request Forgery and is a type of attack in which a vulnerable server is forced by the attacker/hacker to trigger unwanted malicious requests to the third-party servers and/or to internal resources. XML stands for XML External Entity and is a type of attack that is performed over an application that parses…
Read more