Tag: cybersecurity researcher

Top Software Testing Services

Online Trackers Are Now Shifting To New Invasive CNAME Cloaking Technique

More and more browser developers are constantly pushing harder to shift to third-party tracking, whereas organizations of advertising technology are now relying on a new DNS method to exploit these defenses resulting in threats and risks to user privacy and web security. A bunch of researchers including Guner Acar, Wouter Joosen, Yana Dimova, Lukasz Olenjnik,…
Read more

Experts Find A Way To Know Whatever Is Being Typed By A User During A Video Call

Another new assault method has been discovered by experts which can understand the keys pressed by the targeted user at the opposite end during the video conference call by utilizing only the video feed to connect displayed body movements to the content being typed/composed. The examination was done by Mohd Sabra, and Murtuza Jadliwala from…
Read more

Hackers Behind APOMacroSploit Malware Builder Exposed By Researchers

Cybersecurity researchers have revealed another sort of Office malware dispersed as a component of a vindictive email campaign that focused over 80 clients worldwide trying to control casualty machines and take data remotely. The tool dubbed as APOMacroSploit is a macro abuse generator that permits the client to make an Excel document with the capability…
Read more

MoU Signed By HCL Technologies With IIT-Kanpur For The Development Of Cybersecurity

On Monday, HCL (Hindustan Computers Limited) Technologies, released an update on its newsroom, in which the organization said that they have entered/signed a Memorandum Of Understanding (MoU) with the Indian Institute Of Technology Kanpur (IITK) to collaborate in the sector of cybersecurity. HCL Technologies is an Indian multinational technology company that specializes in information technology…
Read more

Google Reveals That North Korean Hackers Are Targeting Security Researchers By Creating Fake Persona On Social Networks

As per Google’s recent Threat Analysis Group (TAG), a hacking group backed by the North Korean government has targeted cybersecurity researchers by leveraging their curiosity for the development of exploits and research for vulnerabilities. Google’s Threat Analysis Group is a security team of Google focused on hunting APT (Advanced Persistent Threat) groups. These bad actors…
Read more

New Family Of Credential Stealing Android Malware, Forewarns Italy CERT

Researchers recently unveiled a new family of credential stealing Android malware which exploits the Androids accessibility service to capture video and audio of activities going on the device display and steal credentials of the user. The malware was first found by the AddressIntel and was named Oscorp by Italy’s CERT-AGID. Researchers highlighted, “it should be…
Read more

Researchers Discovered Hacking Of Azure Functions And Escaping Docker

Paul Litvak, a cybersecurity researcher at Interzer Lab, recently revealed an unfixed vulnerability in Microsoft Azure Functions that could be utilized by an aggressor to elevate rights and escape from the Docker container that is utilized for facilitating them (privileges). The discovery of the vulnerability occurred during the Intezer Lab’s examinations concerning the Azure compute…
Read more

Cybersecurity Researchers Suggests That Joe Biden’s Peloton Bike Can Cause Cybersecurity Threat

Joe Biden’s wellness system may conceivably cause a surprising migraine for security administrations equipped with the protection of the new president in the White House, with his Peloton exercise bike believed by few experts as a strong cybersecurity threat. Biden is accounted for to begin every day with an exercise in a rec center outfitted…
Read more

Discovery Of An Exploit That Allows Kindle E-Reader Takeover Was Awarded $18000 By Amazon

A cybersecurity researcher, Yogev Bar-On at Realmode Labs, an Israel-based cybersecurity consulting firm, discovered an exploit named as KindleDrip in October 2020. According to Amazon, to execute this attack successfully, it involves exploiting three different security flaws. The principal weakness in the exploit was identified with the “Send to Kindle” service, which permits clients to…
Read more

Access Control Protection Bypass Patched By CoTURN – A VoIP Flaw

Cybersecurity researchers have recently found that using a vulnerability attackers/hackers could avoid the security measures of the CoTURN server’s default access control and gain access to network services past the firewall. One of the analysts presented an assumption that, under particular conditions, an attacker/hacker could proceed to accomplish remote code execution (RCE), in spite of…
Read more