Author: Pratyush Malviya

Top Software Testing Services

Experts Find A Way To Know Whatever Is Being Typed By A User During A Video Call

Another new assault method has been discovered by experts which can understand the keys pressed by the targeted user at the opposite end during the video conference call by utilizing only the video feed to connect displayed body movements to the content being typed/composed. The examination was done by Mohd Sabra, and Murtuza Jadliwala from…
Read more

Apple Will Hide Its Users IP From Google By Proxying Requests Of Safe Browsing

Apple‘s forthcoming iOS 14.5 update will be accompanied by another new feature that will divert all the fake site checks through its own proxy servers as a workaround to secure client privacy and forestall spilling IP addresses to Google. An implicit security-centered feature of the Safari browser, known as Fraudulent Website Warning, cautions clients about…
Read more

French Organizations Being Targeted By Hackers Via Exploitation of Centreon

Sandworm is a Russia-connected nation-backed threat actor which has been connected to a three-year-long secret campaign to hack casualties by exploiting Centreon, which is a tool for IT monitoring. The French information/data security organization ANSSI in a warning explained that this crusade, which is responsible for penetrating a lot of French organizations, is believed to…
Read more

MoU Signed By HCL Technologies With IIT-Kanpur For The Development Of Cybersecurity

On Monday, HCL (Hindustan Computers Limited) Technologies, released an update on its newsroom, in which the organization said that they have entered/signed a Memorandum Of Understanding (MoU) with the Indian Institute Of Technology Kanpur (IITK) to collaborate in the sector of cybersecurity. HCL Technologies is an Indian multinational technology company that specializes in information technology…
Read more

Access To User’s Email Inboxes Was Being Sold By An Employee Of Yandex

Yandex is a Russian Dutch-domiciled search engine, ride-hailing, and email service provider, who on Friday uncovered a data breach in which email accounts of 4,887 of its users were breached or compromised. The organization accused an anonymous employee of the occurrence of this event, who had been giving unauthorized access to the clients’ email inboxes…
Read more

SaaS Security Posture Management With Misconfigured SaaS Settings

Not all but most of the organizations in today’s world, which is full of cybercriminals and cybercrime groups, are mainly concerned about their cloud security situation or reputation. What’s even more concerning for organizations is the SaaS (Software-as-a-service) Security Posture Management (SSPM). A recent attack faced and revealed by Malwarebytes explained how they were targeted…
Read more

Researchers Found Pakistan Officials Being Targeted By New Android Spying Campaign

Researchers from Lookout discovered two new Android surveillanceware families that have been targeting military, nuclear/atomic, and political entities of Pakistan and Kashmir as a component of a pro-India, which is a nation-backed/state-sponsored hacking operation/campaign. The malwares named Hornbill and Sunbird imitate genuine or apparently harmless administrations to cover its tracks, just to subtly gather SMSs,…
Read more

$100 Million Of Cryptocurrency Stolen By 10 SIM Swappers, Now Arrested

Ten individuals having a place with a criminal organization have been arrested regarding a series of SIM-swapping assaults that brought about the robbery of more than $100 million by taking control over the accounts of mobile phones of prominent personalities in the U.S. The year-long investigation that was conducted by Europol was together led by…
Read more

Best Practices For DevSecOps

A simple DevSecOps definition is that it is short for development, security, and operations. Its  mantra is to make everyone accountable for security with the objective of implementing security decisions and actions at the same scale and speed as development and operations decisions and actions. Every organization with a DevOps framework should be looking to…
Read more

All Your Queries About Vulnerability Management

In the previous years, all of us may have heard the reports of data breaches that took place over some of the most popular and reputed platforms. For instance, a breach took place in 2020 on Twitter in which a number of Twitter handles were captured and were being ransomed for $1000 to $2000. Fake…
Read more