Cybersecurity News

Top Software Testing Services

File Manager WordPress Plugin Zero-Day Vulnerability Risked Thousands Of Websites

A new zero-day vulnerability was founded by Wordfence in a WordPress plugin. The vulnerability existed in the file manager plugin and allows unauthenticated attackers to execute arbitrary code on a WordPress site. WordPress is a popular website building website and is used by millions of users worldwide. The vulnerability has affected 70,000 active users of…
Read more

FBI and NSA expose new Linux Russian malware Drovorub

The cold war started in 1947, leading to the race of nuclear weapons that might have ended in 1991, but the relations between the two world powers have never been friendly. The two nations never hesitate to trouble each other. But this time, the FBI has shown serious concerns regarding a Russian“wood cutter.” What is…
Read more

Maximum Lifespan of SSL/TLS Certificates is 398 Days from September 1

SSL/TLS certificates allow an authenticated communication between a browser and a web server, while at the same time verifying the identity of the domain that holds the certificate. The lifespan of the certificate shall have a fixed life cycle. This is defined by the ‘Valid From’ and ‘Valid To’ attributes. If the credential expires, it…
Read more

27 Years Old Russian Arrested for offering $1 Million to USA based company employee for planting malware

Cybercrime is the greatest threat to every company in the world – Ginni Rommety. With the advancement of technology, the Cyberworld is also emerging with some evil mindsets. They are always waiting for the opportunity to take privileges of the system. The FBI has arrested recently Russian nationalist named Egor Igorevich Kriuchkov on the charge of…
Read more

ReVoLTE: Eavesdropping Possible on Encrypted LTE Calls

A new study revealed a foundational vulnerability in the VoLTE calls, which could enable the attacker to eavesdrop on voice calls and even extract important data. The vulnerability is named ReVoLTE. The study Call Me Maybe is conducted by researchers from Ruhr University Bochum. A theoretical framework for the study was laid down by Raza…
Read more

Microsoft logo

Microsoft August 2020 New Patch fixes 120 vulnerabilities, two 0-days

Microsoft released its updated version recently for its users. It fixed 120 vulnerabilities in 13 products in this new version. Out of these 120, 17 are rated as most critical. The rate at which Microsoft is patching its vulnerabilities is probably putting a lot of pressure on its CVE team. Out of the patched vulnerabilities so far,…
Read more

browser

Browser CSP Bug Exposes Billions of Users Vulnerable to Data Theft

A bug was discovered recently in chromium-based browsers- chrome, opera, edge on Windows, Mac, and Android, which allows the attacker to bypass the CSP protocols entirely.  Gal Weizman, a JavaScript expert at Perimeter X, found the browser bug and vividly talked about it in his blog. The bug, CVE-2020-6519, was present in the chrome versions 73…
Read more

HaveIbeenPwned to go Open-Source

HaveIBeenPwned (HIBP) is a website that allows its users to check whether their data has been compromised. Its founder Troy Hunt who is also a Microsoft Regional Director, an MVP, and a renowned speaker, regularly shares his journey about HIBP through his blog. A recent announcement about the platform going open source has put it into the limelight. …
Read more

GEDmatch Breach: DNA Data of Million Users Exposed

A major breach in GEDmatch led to alterations in the permission setting of all the users. On 19 July, a security breach was reported to the GED officials when an attack was targeted at the server via an existing account. To handle the situation, the site was taken down by the authorities. The breach resulted…
Read more

Flawed Satellite Internet to Compromise Plane and Ship Safety

Satellite broadband services have applications in various sectors- Aviation, marine, and terrestrial, from domestic to commercial. Discrepancies in the security of the systems have been identified earlier. With time, the systems advanced, but they are often unencrypted and vulnerable to eavesdropping attacks by anybody sitting anywhere using remote access. The high cost of equipment has…
Read more