Cybersecurity News

Top Software Testing Services

India as an Emerging Hack-For-Hire Hub

As the Cyberworld is advancing, so are the methods of invading cybersecurity by the attackers. Hacking, just like any other profession, has two types of usage- legitimate and non-legitimate. A recent report by Google TAG indicated a rise in hack-for-hire operations and claimed that most operations are based in countries like Iran, India, China, etc. …
Read more

New credit card attack, Inter skimming kit used in homoglyph attacks

Hackers working for financial motives to extract the credit card information of the users is not new. Several methods are being adopted over the span of time to trick users into giving their details. Further progress has been made in this regard. Malwarebytes has identified a new type of attack used for credit card skimming.  It combines…
Read more

Coordinated attack on Reddit, Hackers Hijack Mod Account

A coordinated hack attack happened on Reddit a few days ago. The hackers have reportedly posted messages or changed subreddit design in support of President Donald Trump.  The attack seemed to target high-profile subreddits just like the twitter hack that happened last month when twitter accounts of high-profile personalities were hacked, and tweets were made from the…
Read more

Iranian Hacker group: first APT to use DNS over HTTPS for Attacks

An Iranian cybercriminal group, also known as APT34, has been reported as the first-ever known group to use DNS over HTTPS protocol to exfiltrate data on compromised systems. Vicente Diaz, a malware analyst for antivirus maker Kaspersky, spoke about the attacks at a webinar last week. He said that these types of attacks had been…
Read more

Cybersecurity for International Space Station

A former NASA astronaut Pamela Melroy talked about the cybersecurity issues concerning space based infrastructure at the  Aerospace Village within the DEFCON virtual security conference. She served as pilot on Space Shuttle missions STS-92 and STS-112 and commanded mission STS-120 before leaving the agency in August 2009. The International Space Station (ISS) is a hub of computer systems, and…
Read more

AI the Future of Cybersecurity: Managing Threats and Exclusive Risk Management

Artificial intelligence is a field of science that is interested in finding solutions to complex problems through computing algorithms based on human decision mechanisms. The purpose of using AI is to solve the issues and offer solutions in a short period of time using algorithms that could have been used by any human but would…
Read more

Arrested Whitehat Hackers Requested for Good Samaritan Law

Last year in September, two pen testers Justin Wynn and Gary Demercurio, who work for the firm coalfire, were arrested for felony charges by the authorities when they were just doing their job. They had been appointed by the state on a contract basis to check the physical and technical security of the courthouse premises.…
Read more

New Research on Speculative Execution Attacks: AMD, Intel, ARM, IBM Processors Vulnerable

There has been a lot of research conducted to determine the root cause of speculative execution attacks against modern processors and as it turns out the recently released research paper by the researchers at the Graz University of Technology explains the exploitation of pre-fetching effect more accurately than the previously published papers. It clearly states that…
Read more

capital1

$80 Million Penalty on Capital One for July Data Breach

Capital One Financial Corporation is an American bank specializing in credit cards, auto loans, banking and savings accounts. It has been charged with $80 million owing to a data breach that happened in July last year. The Office of the Comptroller of the Currency (OCC) informed about the fine in a Press Release. The OCC has…
Read more

COVID 19

Cybersecurity to take a front Seat for Businesses since COVID-19

For any organization, its data is the most crucial entity that needs extensive protection, given the type of data breaches that are happening around the world. The attackers employ various ways to get access to the data.  The novel Covid-19 has resulted in a substantial shift from a centralized network database to the remote cloud-based…
Read more