Cybersecurity News

Top Software Testing Services

firefox

Exploitation of LAN vulnerability found in Firefox for Android

New Vulnerability in SSDP engine of firefox for android discovered, can be exploited without any malicious links or website click and launch as applications without user permission, says Australian based exploit researcher Chris Moberly. Recently, firefox application(v 68.11.0 and below) for android devices was found to be vulnerable because of a faulty code that could…
Read more

According To a Recent Report 97% of Top Cybersecurity Companies Got Hacked in 2020

For today’s companies, data compromises are one of the top issues. With the estimated global cost of a single violation hovering at $3.62 million, these violations’ cost continues to rise. Network security is also hugely relevant for any company beyond the financial implications of a hack, since an attack will undermine your consumers’ faith. Indeed, within six…
Read more

New Unpatched Bluetooth Flaw

Bluetooth 4.2 and 5.0, supporting dual-mode are vulnerable to key overwriting, says the Researchers at the École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University in independent researches. The devices from iPad Pro to iPhone 11 run on these vulnerable Bluetooth versions. Cross Transport Key Derivation(CTKD), which is responsible to authenticate keys, when pairing two…
Read more

Small and mid business

Cybersecurity on the Front Seat for Small To Medium-Sized Businesses

With the rapid advancement in the cyber world, cyber threats are also becoming imperative. Cybersecurity has become one of the critical sectors that companies are investing in. The companies and businesses, irrespective of their scale of operation, are prone to the prevalent cyber threats today. The number and extent of attacks have seen a rise,…
Read more

INVDOS

Invdos Bug That Could Have Crashed Bitcoin and Other Blockchain Nodes Finally Fixed After Two Years

Years old vulnerability finally revealed to the public upon rediscovery after being patched for two years. A protocol engineer by profession, Javed Khan, rediscovered a vulnerability during the Decred Bug Bounty program, an open program aimed to find bugs in the software which led the vulnerability to be disclosed to the world, which was rather kept…
Read more

emvbug

New Research Revealed Flaw in Pin Verification System of EMV

A recent study by a group of researchers at ETH Zurich University has revealed severe flaws in the EVM protocol design that makes it prone to many types of attacks. Although the security for EMV has been advertised, many attacks over the years have indicated otherwise.  EMV is the international standard protocol for smart card…
Read more

malware

Instantaneous Increase of Emotet Trojan Attacks reported by authorities from Japan, France, New Zealand

In 2014, Emotet was first discovered as a “simple” banking trojan intended to steal financial data. Since it has developed over time into a botnet and incorporated modularity, such as the ability to distribute ransomware using worm-like functionality, therefore, it has been described by the US Department of Homeland Security as “one of the most expensive and…
Read more

Instagram Retaining Deleted User Data: Bug Reported by Researcher

A bug was reported recently on Instagram by a researcher, Saugat Pokharal, in a blog post. Saugat is a security researcher who lives in Kathmandu, Nepal. He revealed that he accidentally found out that the company retained the copy of data on its servers even when the users had deleted it from their accounts.  Instagram is…
Read more

Best free resource for learning cybersecurity online

Looking to secure your business from cyber frauds or wanting a job in IT security, or just fascinated by the movies and want to hack like them. You have to start somewhere. We will provide you some of the best, free of cost online resources to kick start your career today. Cybersecurity is the hot…
Read more

money

EVILNUM group targeting Financial firm

EVILNUM, an advanced and persistent threat community with the bulk of targets in EU countries and the United Kingdom, has also noticed threats in countries such as Australia and Canada. According to ESET’s telemetry, the EVILNUM group’s priorities are financial technology firms – for example, businesses that provide online exchange services and resources.  Previously, Evilnum…
Read more