Author: Pratyush Malviya

Top Software Testing Services

Leaked Data of 10 Crore Indian Card Holders Is Being Sold On Dark Web After Juspay Faces a Cyber Attack In August

The data of 10 crore users have been leaked and is being sold on the dark web. The number of users affected by the leaked data can be considered to be the biggest data leak in Indian history. The data was leaked from the servers of Juspay. Juspay is a mobile payments solution company that is…
Read more

6 Questions Hackers Use As A Base To Select A Resource To Exploit

Studying the “Hacker Logic” can help us to know how hackers choose their target and how can we make our defenses stronger, explained at Randori by David “moose” Wolpoff. A huge shift towards the cloud can be easily noticed in the past few years. Another shift to remote working enforced by the Covid-19 pandemic situation…
Read more

The Advanced Bot Protection

Bots makes up about 40% of the Internet traffic and have become an essential part of the Internet in the last few decades. The Bots are sophisticated software programs that are mainly used to perform automated tasks over the Internet. Most of the Bots are assigned to scan content, interacting with users, and searching for…
Read more

Windows 0-Day Bug, Poorly Patched, Now Unpatched, Reveals Google

A public disclosure of poorly patched security vulnerability in Windows print spooler API was made by Google’s Project Zero Team. This bug could be taken advantage of by attackers or hackers to perform arbitrary code execution. The bug was disclosed to Microsoft in December 2019 by an unidentified user working with Trend Micro’s Zero Day…
Read more

21 WeLeakInfo Users Get Arrested By UK Police For Buying Breached Personal Data

The U.K. police arrests 21 people who were the customers of a website named WeLeakInfo, which is now inoperative since the arrest. It is said that the website was set to sell personal data, that was breached/hacked from various sites. The arrest was the part of a cyber crackdown that went nationwide. The U.K. NCA…
Read more

Small and mid business

Cybersecurity on the Front Seat for Small To Medium-Sized Businesses

With the rapid advancement in the cyber world, cyber threats are also becoming imperative. Cybersecurity has become one of the critical sectors that companies are investing in. The companies and businesses, irrespective of their scale of operation, are prone to the prevalent cyber threats today. The number and extent of attacks have seen a rise,…
Read more

Instagram Retaining Deleted User Data: Bug Reported by Researcher

A bug was reported recently on Instagram by a researcher, Saugat Pokharal, in a blog post. Saugat is a security researcher who lives in Kathmandu, Nepal. He revealed that he accidentally found out that the company retained the copy of data on its servers even when the users had deleted it from their accounts.  Instagram is…
Read more

ReVoLTE: Eavesdropping Possible on Encrypted LTE Calls

A new study revealed a foundational vulnerability in the VoLTE calls, which could enable the attacker to eavesdrop on voice calls and even extract important data. The vulnerability is named ReVoLTE. The study Call Me Maybe is conducted by researchers from Ruhr University Bochum. A theoretical framework for the study was laid down by Raza…
Read more

browser

Browser CSP Bug Exposes Billions of Users Vulnerable to Data Theft

A bug was discovered recently in chromium-based browsers- chrome, opera, edge on Windows, Mac, and Android, which allows the attacker to bypass the CSP protocols entirely.  Gal Weizman, a JavaScript expert at Perimeter X, found the browser bug and vividly talked about it in his blog. The bug, CVE-2020-6519, was present in the chrome versions 73…
Read more

Flawed Satellite Internet to Compromise Plane and Ship Safety

Satellite broadband services have applications in various sectors- Aviation, marine, and terrestrial, from domestic to commercial. Discrepancies in the security of the systems have been identified earlier. With time, the systems advanced, but they are often unencrypted and vulnerable to eavesdropping attacks by anybody sitting anywhere using remote access. The high cost of equipment has…
Read more