Author: Pratyush Malviya

Top Software Testing Services

A Country’s Top Level Expired Domain Saved From Hackers By A Cybersecurity Researcher

In October 2020, a significant domain name of a country’s internet space started to expire, however, it was an infamous, mostly a secret, domain. Maybe, some responsible person must have forgotten to pay the price for continuing the use of the domain name. However, the domains that are expired do not vanish away at a…
Read more

Joe Biden Proposes $9bn Funding For US Agencies of Cyber Security

To enhance the work of cybersecurity agencies and their capabilities, to support the Cybersecurity and Information Security Agency (CISA), and bring up a vital upgrade to federal government security, Joe Biden (President-elect) has put-forward a funding plan of $9bn (i.e. 6.6bn Euros). This complete funding operation is a part of the American Rescue Plan that…
Read more

A Cybersecurity Researcher Stole User Information Through A XSS Attack Using Parameter Pollution

A cybersecurity researcher named Hamza Avvan, while scrolling on Twitter finds a motivational tweet that inspired him to do some bug bounty. He quickly logs into his bugcrowd account, searched for a comfortable subject within the capacity of his skills, and chose a target (on which he had already discovered bugs earlier). He starts by…
Read more

Mimecast Certificate That Is Used to Connect With Microsoft 365 securely Has Been Stolen By Hackers

Mimecast is a London-based company that servers cloud-based email management service to Microsoft Office 365 and Microsoft Exchange who protects email platforms from phishing attacks, spam, malware, etc., in a blog post on Tuesday informed their customers that a threat actor has exploited and breached a certificate that the company serves to some of its…
Read more

Hardware Enabled Ransomware Detection Added By Intel To 11th Gen vPro Chips

The 11th generation Core vPro business-class processors will come with an in-built anti-ransomware defense which will be added by Intel in partnership with Cybereason. The Threat Detection Technology (TDT) and The Hardware Shield are the two main hardware-based security improvements that are heated into Intel’s vPro platform which can further empower detection and profiling of…
Read more

Another Malware Named Sunspot Discovered That Was Used To Insert Sunburst Malware (Backdoor) In SolarWinds Cyber Attack

CrowdStrike – a cybersecurity firm that found another malware utilized by the SolarWinds attackers to infuse the backdoor in Orion software during the supply chain assault that prompted the trade-off of a few organizations and government offices. As the research moves deeper concerning the SolarWinds supply chain attack, cybersecurity specialists have uncovered a third malware…
Read more

Attackers Can Clone Google Titan 2FA Keys Via a Key-Recovery-Attack Using A Side Channel in NXP Chip

The most secure intends to protect one’s account from breaches, takeover, and phishing attacks is considered to be the hardware security keys likewise served by Yubico and Google. An examination that was published on Thursday explained how an attacker in control of a gadget with two-factor authentication (2FA) can mirror it by misusing the side-channel…
Read more

SolarWinds Cyber Attack Is Likely A Russian Origin Intelligence Gathering Effort

SolarWinds supply chain attack that was detected in the previous month is now blamed officially on the Russian government by the U.S. government (on Tuesday) for planning and execution of this cyber attack. A joint statement released togetherly by the FBI (Federal Bureau of Investigation), the CISA (Cybersecurity and Infrastructure Security Agency), the ODNI (Office…
Read more

Cyber Attacks Related To Covid19 Vaccine Shouldn’t Be Seen Mildly

Pretty much every country is in a competition to create a profoundly viable vaccine to control the pandemic. Notwithstanding, there have been a few misfortunes and dangers affecting this situation, cyberattacks are one of them. Coronavirus antibody-related cyberattacks and misrepresentation occurrences are happening almost every single day. This is the time to begin dealing with…
Read more

A New Github-hosted Malware Strain Abuses Github And Imgur

A new strand of malware strain has been found that utilizes word document files embedded with macros for downloading GitHub facilitated PowerShell scripts. This downloaded PowerShell script is further used to decrypt the Cobalt Strike Script on Windows by downloading a genuine image file from Imgur – an image hosting service. A lot of researchers…
Read more