Author: Pratima Lohar

Top Software Testing Services

Microsoft October 2020 Patch Tuesday fixes 87 vulnerabilities

Microsoft released its monthly batch of security fixes known as Patch Tuesday on the 13th of October, in which 87 bugs have been patched by the OS manufacturer this month across a wide variety of Microsoft software. Microsoft has released security patches for all supported versions of the company’s Windows operating system, as well as…
Read more

What is Open Source Intelligence (OSINT)- How can I make use of it?

OSINT represents Open Source Intelligence and it is one of the key viewpoints in understanding the cybersecurity awareness that leads the Internet nowadays. The term OSINT originates from numerous many years prior. Indeed, US military offices began utilizing the term OSINT in the last part of the 1980s as they were re-examining the idea of…
Read more

Security experts hacked Apple for 3 months- Here what they found

In the wake of getting some answers concerning Apple’s Bug Bounty Program, a gathering of security scientists — Sam Curry, Brett Buerhaus, Ben Sadeghipour, Samuel Erb, and Tanner Barnes — cooperated and hacked Apple from July 6, 2020, to October 6, 2020. During their commitment, they found several vulnerabilities in key parts of their infrastructure…
Read more

CONTI Ransomware explained: How it works and how to defend it

CONTI is malicious software categorized as ransomware. Systems infected with this malware have their data encrypted and request a ransom for decryption to the victims. All the affected files are appended with the “.CONTI” suffix during the encryption process. For instance, a file originally called “Example.jpg” will appear as “Example.jpg.CONTI” following encryption. A text file…
Read more

Federal Agency Compromised by Malicious Cyber Actor

Investigation on a recent malware attack by a threat actor on the corporate network of a federal organization has been released by the U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA).  The cyber threat attacker leveraged compromised credentials to install sophisticated malware, including multi-stage malware that evaded the anti-malware security of the…
Read more

Zerologon vulnerability

Zero logon Vulnerability: Instantly Become Domain Admin by Subverting Netlogon Cryptography

Zerologon is the name that was assigned to a vulnerability found in CVE-2020-1472. Due to the error in the log on method, it is called Zerologon, where the initialization vector (IV) is set to all zeros all the time, random numbers should still be an initialization vector (IV). An emergency advisory urging civilian federal agencies to take…
Read more

Researchers finds ongoing surveillance campaign from 2014 targeting Iranian expats and defectors

The history of Iranian cyber-offensive operations has shown that the same threat actors responsible for espionage against the private sector are engaged in surveillance of human rights defenders and are significantly more successful. The relationship between Iran-originated cyber activities and the government, as well as the motivations for such operations, is made more apparent by the lens…
Read more

According To a Recent Report 97% of Top Cybersecurity Companies Got Hacked in 2020

For today’s companies, data compromises are one of the top issues. With the estimated global cost of a single violation hovering at $3.62 million, these violations’ cost continues to rise. Network security is also hugely relevant for any company beyond the financial implications of a hack, since an attack will undermine your consumers’ faith. Indeed, within six…
Read more

malware

Instantaneous Increase of Emotet Trojan Attacks reported by authorities from Japan, France, New Zealand

In 2014, Emotet was first discovered as a “simple” banking trojan intended to steal financial data. Since it has developed over time into a botnet and incorporated modularity, such as the ability to distribute ransomware using worm-like functionality, therefore, it has been described by the US Department of Homeland Security as “one of the most expensive and…
Read more

money

EVILNUM group targeting Financial firm

EVILNUM, an advanced and persistent threat community with the bulk of targets in EU countries and the United Kingdom, has also noticed threats in countries such as Australia and Canada. According to ESET’s telemetry, the EVILNUM group’s priorities are financial technology firms – for example, businesses that provide online exchange services and resources.  Previously, Evilnum…
Read more