Cybersecurity News

Top Software Testing Services

How To Test For Prototype Pollution

Testing for client-side prototype pollution DOM Invader provides a number of features to help you test for client-side prototype pollution vulnerabilities. These enable you to perform the following key tasks: Automatically detect sources for prototype pollution in the URL and any JSON objects sent via web messages. This includes detecting alternative techniques using the same source. Generate…
Read more

Prototype Pollution

What Is Prototype Pollution? Prototype pollution is a vulnerability that enables threat actors to exploit JavaScript runtimes. In a prototype pollution attack, threat actors inject properties into existing JavaScript construct prototypes, attempting to compromise the application. This vulnerability is called prototype pollution because it allows threat actors to inject values that overwrite or pollute the…
Read more

Online Trackers Are Now Shifting To New Invasive CNAME Cloaking Technique

More and more browser developers are constantly pushing harder to shift to third-party tracking, whereas organizations of advertising technology are now relying on a new DNS method to exploit these defenses resulting in threats and risks to user privacy and web security. A bunch of researchers including Guner Acar, Wouter Joosen, Yana Dimova, Lukasz Olenjnik,…
Read more

What is Nmap And Why You Should Use It?

IT managers, network administrators, and security experts generally suffer an endless fight, continuously keeping an eye on what precisely is running on their organization’s network and the possible weaknesses/vulnerabilities that hide inside. While there is an abundance of screening/monitoring utilities accessible for network mapping and security reviewing, none can beat Nmap’s blend of flexibility and…
Read more

Experts Find A Way To Know Whatever Is Being Typed By A User During A Video Call

Another new assault method has been discovered by experts which can understand the keys pressed by the targeted user at the opposite end during the video conference call by utilizing only the video feed to connect displayed body movements to the content being typed/composed. The examination was done by Mohd Sabra, and Murtuza Jadliwala from…
Read more

Hackers Behind APOMacroSploit Malware Builder Exposed By Researchers

Cybersecurity researchers have revealed another sort of Office malware dispersed as a component of a vindictive email campaign that focused over 80 clients worldwide trying to control casualty machines and take data remotely. The tool dubbed as APOMacroSploit is a macro abuse generator that permits the client to make an Excel document with the capability…
Read more

Malware For Apple M1 Chip Has Been Discovered For The First Time In The Wild

The first malware variant custom-fitted to run locally on Apple’s M1 chips has been found, hinting another advancement that demonstrates that threat actors have started adjusting with vindictive software to focus on the organization’s most recent generation of Macs fueled by its own processors. While the transition to Apple silicon has required developers to construct…
Read more

Many Video Calling Platforms Vulnerable To Snooping Due To A Bug In Agora SDK

McAfee’s Advanced Threat Research Team, published a report/research, according to which, attackers or hackers would have been able to snoop or spy on active private audio and video calls utilizing a critical vulnerability found in the popular SDK (Software Development Kit) of video calling platforms. The report explains that the vulnerability was found in SDK…
Read more

$1.3 Billion Cryptocurrency Heist Blamed On Three North Korean Hackers By US

On Wednesday, three North Korean hackers were charged by the US Department of Justice for reportedly planning to steal and extort from financial and business organizations, an amount of more than $1.3 billion in form of cryptocurrency and cash. It is believed that three individual hackers are part of a military intelligence organization of North…
Read more

A Vulnerability In Android App ShareIt May Have Allowed Hackers To Infuse Malware

Different unpatched weaknesses have been found in SHAREit, which is a famous application with more than one billion downloads, that could be mishandled to release a client’s delicate information, execute malicious code, and conceivably result in remote code execution. The vulnerabilities were discovered through Trend Micro‘s examination of the Android variant of the application that…
Read more