Cybersecurity News

Top Software Testing Services

RokRat Trojan Used By North Korean Attackers To Target South Korea

A North Korean group of attackers has been discovered sending the RokRat Trojan in another lance-phishing effort focusing on the South Korean government. Connecting the assault to APT37 (otherwise known as Starcruft, Ricochet Chollima, or Reaper), Malwarebytes stated that they recognized a vindictive doc earlier in December that, when clicked and opened, a macro is…
Read more

Another Malware Named Sunspot Discovered That Was Used To Insert Sunburst Malware (Backdoor) In SolarWinds Cyber Attack

CrowdStrike – a cybersecurity firm that found another malware utilized by the SolarWinds attackers to infuse the backdoor in Orion software during the supply chain assault that prompted the trade-off of a few organizations and government offices. As the research moves deeper concerning the SolarWinds supply chain attack, cybersecurity specialists have uncovered a third malware…
Read more

Links Found By Researchers Between Sunburst And Russian Malware Kazuar

It’s the first time when cybersecurity researchers have discovered a likely association between the backdoor that was utilized in the SolarWinds Supply Chain Attack and a formerly known malware strain. In a new examination that was published by Kaspersky scientists, the online protection firm said it found a few highlights that are quite similar with…
Read more

A researcher got paid $10,000 for a bug that doesn’t even exist

A security researcher named Valeriy Shevchenko received a 3-week vacation while switching jobs a-mid COVID-19. During the vacation, he thought of trying some bug bounty hunting and went on with it. Sooner he found a bug bounty program whose scope was recently added with a new target and he started trying to discover some bugs.…
Read more

Attackers Can Clone Google Titan 2FA Keys Via a Key-Recovery-Attack Using A Side Channel in NXP Chip

The most secure intends to protect one’s account from breaches, takeover, and phishing attacks is considered to be the hardware security keys likewise served by Yubico and Google. An examination that was published on Thursday explained how an attacker in control of a gadget with two-factor authentication (2FA) can mirror it by misusing the side-channel…
Read more

Russian Hacker Sentenced For 12-Years In Prison For Hitting JPMorgan Chase And Others With Massive Hacks

A 37-year-old highly skilled Russian hacker (named Andrei Tyurin) was sentenced to prison for about 12 years for executing a worldwide hacking campaign in which he breached networks of JPMorgan Chase, the Wall Street Journal, many financial institutions, brokerage firms, and many other major institutions and stole information of more than 100 million particulars making…
Read more

Estimating Cookies To Keep Backdoors Out of Sight

Computer cookies is a term for data packets that a computer receives and sends back without making any sort of changes. They contain user info about visiting a website and activities performed in the meantime. Whereas Backdoors are meant to gain unauthorized access to a website or application data without being detected. Discovering a backdoor…
Read more

SolarWinds Cyber Attack Is Likely A Russian Origin Intelligence Gathering Effort

SolarWinds supply chain attack that was detected in the previous month is now blamed officially on the Russian government by the U.S. government (on Tuesday) for planning and execution of this cyber attack. A joint statement released togetherly by the FBI (Federal Bureau of Investigation), the CISA (Cybersecurity and Infrastructure Security Agency), the ODNI (Office…
Read more

Attackers Using ElectroRAT Malware To Target Cryptocurrency Users

Network safety scientists today uncovered a wide-running fraud focusing on cryptographic money clients that started as ahead of schedule as of January a year ago to spread trojanized applications to introduce a formerly undetected remotely accessible tool on targeted devices. The RAT is composed by a ground-up in Golang and intended to focus on various…
Read more