Category: Cyber Attacks

Top Software Testing Services

How To Test For Prototype Pollution

Testing for client-side prototype pollution DOM Invader provides a number of features to help you test for client-side prototype pollution vulnerabilities. These enable you to perform the following key tasks: Automatically detect sources for prototype pollution in the URL and any JSON objects sent via web messages. This includes detecting alternative techniques using the same source. Generate…
Read more

Prototype Pollution

What Is Prototype Pollution? Prototype pollution is a vulnerability that enables threat actors to exploit JavaScript runtimes. In a prototype pollution attack, threat actors inject properties into existing JavaScript construct prototypes, attempting to compromise the application. This vulnerability is called prototype pollution because it allows threat actors to inject values that overwrite or pollute the…
Read more

French Organizations Being Targeted By Hackers Via Exploitation of Centreon

Sandworm is a Russia-connected nation-backed threat actor which has been connected to a three-year-long secret campaign to hack casualties by exploiting Centreon, which is a tool for IT monitoring. The French information/data security organization ANSSI in a warning explained that this crusade, which is responsible for penetrating a lot of French organizations, is believed to…
Read more

Iran Performing Espionage Campaigns On Dissidents

As per CheckPoint, a cybersecurity company, over 1000 dissidents and expats are being targeted by two separate surveillance campaigns being operated in cyber-space by Iran. CheckPoint researchers explained that the campaigns were initiated against people in Iran and other 12 different nations involving the US and UK. Also, the two groups behind the campaigns were…
Read more

Researchers Found Pakistan Officials Being Targeted By New Android Spying Campaign

Researchers from Lookout discovered two new Android surveillanceware families that have been targeting military, nuclear/atomic, and political entities of Pakistan and Kashmir as a component of a pro-India, which is a nation-backed/state-sponsored hacking operation/campaign. The malwares named Hornbill and Sunbird imitate genuine or apparently harmless administrations to cover its tracks, just to subtly gather SMSs,…
Read more

Government Agencies Of UAE & Kuwait Being Spied On By Iranian Hackers Via Screen Connect

A new research found out that the Iranian threat actors are targeting the government agencies of the UAE and Kuwait as a part of their new cyberespionage operation, utilizing ScreenConnect being distributed via phishing emails. The ScreenConnect is a remote desktop software application, which is now known as ConnectWise Control, that supports unattended access and…
Read more

The Recent Water Treatment Facility Hack Was A Result Of Poor Password Security

New subtleties have arisen about the remote PC interruption at a Florida water treatment plant, featuring an absence of satisfactory safety efforts necessary to make the critical framework conditions impenetrable. The attack/breach which took place last Friday included an ineffective endeavor with respect to an enemy to escalate sodium hydroxide levels in the water supply…
Read more

$100 Million Of Cryptocurrency Stolen By 10 SIM Swappers, Now Arrested

Ten individuals having a place with a criminal organization have been arrested regarding a series of SIM-swapping assaults that brought about the robbery of more than $100 million by taking control over the accounts of mobile phones of prominent personalities in the U.S. The year-long investigation that was conducted by Europol was together led by…
Read more

Due To Thousands Of Vendors, Organizations Carry A Small Part Of Control Over Their Supply Chain Security

Cyberattacks against SolarWinds and other generally executed software security have uncovered a supply chain widespread with exploitable vulnerabilities. Furthermore, still, most organizations have little knowledge about the plenty of providers connected to their networks. It was clarified that 80% of the 1,500 tech and procurement chiefs surveyed by BlueVoyant had encountered at least one penetration/breach…
Read more

Hacker Broke Into Florida’s Treatment System And Attempted To Poison The Water Supply

An attacker/hacker successfully managed to invade the computer framework that controls the water treatment service in the U.S. province of Florida and remotely manipulated a setting that radically modified the concentration of sodium hydroxide (NaOH) in the water. In a press conference that took place yesterday, Pinellas County Sheriff Bob Gualtieri said that an operator…
Read more