Author: Pratyush Malviya

Top Software Testing Services

Another Credential Stuffing Attack Suffered by Spotify

A cybersecurity researcher disclosed a credential stuffing attack has been faced by Spotify, which occurred by utilizing stolen credentials of around 100,000 accounts of users. In the previous few months, this is the second credential stuffing attack that took place on a music platform. Earlier in November 2020, an Elasticsearch database was utilized to target…
Read more

Google Removes The Great Suspender Chrome Extension As It Contains Malware

A well-known chrome extension, known as The Great Suspender, which was utilized by millions and millions of people, was removed by Google from its Chrome Web Store on Thursday with the claim that it contains malware. A notice from Google said that this extension contains malware, yet it has since arisen that the extension silently…
Read more

Cybercriminals Amplifying DDoS Attacks By Compromising Servers Of Plex Media Player

Plex Media server systems are being compromised to boost malicious traffic over the targeted users to take them offline by utilizing a new method/technique of DDoS (Distributed Denial of Service) attack. The ongoing attack was found by researchers of Netscout, who explained that “Plex Media Server is a personal media library and streaming system that…
Read more

Live Facial Recognition To Be Introduced By The Greek Police

Live facial recognition will be introduced by the Greek police before summer. Greek police will get hundreds and thousands of gadgets that will serve the Greek police to identify fingerprints and live facial recognition, by summer 2021. The gadgets will be distributed for the police’s everyday work. The main reason behind the project, named Smart…
Read more

The Malware Hosted By Rocke Group Has Now Received Abilities Of A Worm

Analysts have recognized an updated malware variation utilized by the cybercrime team Rocke Group that focuses on cloud frameworks with crypto-jacking assaults. The malware is known as Pro-Ocean, which was first found in 2019, and has now been reinforced with worm capacities and rootkit discovery avoidance services. A researcher from Palo Alto Networks in a…
Read more

Google Reveals That North Korean Hackers Are Targeting Security Researchers By Creating Fake Persona On Social Networks

As per Google’s recent Threat Analysis Group (TAG), a hacking group backed by the North Korean government has targeted cybersecurity researchers by leveraging their curiosity for the development of exploits and research for vulnerabilities. Google’s Threat Analysis Group is a security team of Google focused on hunting APT (Advanced Persistent Threat) groups. These bad actors…
Read more

A Tool Developed By A Cybercrime Group Creates Phishing Pages in Real-Time

A novel phishing toolkit has been developed by a cybercrime group that has the capabilities to change the logos and text of a phishing page in real-time to adjust with the environments of the targeted casualties. This phishing toolkit, named LogoKit, has already been conveyed in the wild as indicated by threat intelligence firm RiskIQ…
Read more

New Family Of Credential Stealing Android Malware, Forewarns Italy CERT

Researchers recently unveiled a new family of credential stealing Android malware which exploits the Androids accessibility service to capture video and audio of activities going on the device display and steal credentials of the user. The malware was first found by the AddressIntel and was named Oscorp by Italy’s CERT-AGID. Researchers highlighted, “it should be…
Read more

A Severe Gap Filled By Threat Hunting

Threat hunting is a practice or act of searching for cyber threats that may have slipped into your networks. It is a severe discipline that, nowadays, more and more organizations are utilizing to destroy hidden espionage campaigns/attacks prior to letting them breach data or perform malicious operations. Since threat hunting utilizes human knowledge and experience…
Read more

Any Unprivileged User Can Gain Root Privileges On A Linux System Using A Default Sudo Configuration

The research team of Qualys, recently found a vulnerability in sudo, dubbed as the heap overflow vulnerability. Sudo is an omnipresent and powerful open-source utility that is mainly utilized on operating systems like Unix and Linux. This vulnerability has been registered as CVE-2021-3156. Exploiting this vulnerability can allow any unauthorized user, without any permissions, to…
Read more