Cybersecurity News

Top Software Testing Services

GEDmatch Breach: DNA Data of Million Users Exposed

A major breach in GEDmatch led to alterations in the permission setting of all the users. On 19 July, a security breach was reported to the GED officials when an attack was targeted at the server via an existing account. To handle the situation, the site was taken down by the authorities. The breach resulted…
Read more

Flawed Satellite Internet to Compromise Plane and Ship Safety

Satellite broadband services have applications in various sectors- Aviation, marine, and terrestrial, from domestic to commercial. Discrepancies in the security of the systems have been identified earlier. With time, the systems advanced, but they are often unencrypted and vulnerable to eavesdropping attacks by anybody sitting anywhere using remote access. The high cost of equipment has…
Read more

India as an Emerging Hack-For-Hire Hub

As the Cyberworld is advancing, so are the methods of invading cybersecurity by the attackers. Hacking, just like any other profession, has two types of usage- legitimate and non-legitimate. A recent report by Google TAG indicated a rise in hack-for-hire operations and claimed that most operations are based in countries like Iran, India, China, etc. …
Read more

New credit card attack, Inter skimming kit used in homoglyph attacks

Hackers working for financial motives to extract the credit card information of the users is not new. Several methods are being adopted over the span of time to trick users into giving their details. Further progress has been made in this regard. Malwarebytes has identified a new type of attack used for credit card skimming.  It combines…
Read more

Coordinated attack on Reddit, Hackers Hijack Mod Account

A coordinated hack attack happened on Reddit a few days ago. The hackers have reportedly posted messages or changed subreddit design in support of President Donald Trump.  The attack seemed to target high-profile subreddits just like the twitter hack that happened last month when twitter accounts of high-profile personalities were hacked, and tweets were made from the…
Read more

Iranian Hacker group: first APT to use DNS over HTTPS for Attacks

An Iranian cybercriminal group, also known as APT34, has been reported as the first-ever known group to use DNS over HTTPS protocol to exfiltrate data on compromised systems. Vicente Diaz, a malware analyst for antivirus maker Kaspersky, spoke about the attacks at a webinar last week. He said that these types of attacks had been…
Read more

Cybersecurity for International Space Station

A former NASA astronaut Pamela Melroy talked about the cybersecurity issues concerning space based infrastructure at the  Aerospace Village within the DEFCON virtual security conference. She served as pilot on Space Shuttle missions STS-92 and STS-112 and commanded mission STS-120 before leaving the agency in August 2009. The International Space Station (ISS) is a hub of computer systems, and…
Read more

AI the Future of Cybersecurity: Managing Threats and Exclusive Risk Management

Artificial intelligence is a field of science that is interested in finding solutions to complex problems through computing algorithms based on human decision mechanisms. The purpose of using AI is to solve the issues and offer solutions in a short period of time using algorithms that could have been used by any human but would…
Read more

Arrested Whitehat Hackers Requested for Good Samaritan Law

Last year in September, two pen testers Justin Wynn and Gary Demercurio, who work for the firm coalfire, were arrested for felony charges by the authorities when they were just doing their job. They had been appointed by the state on a contract basis to check the physical and technical security of the courthouse premises.…
Read more

New Research on Speculative Execution Attacks: AMD, Intel, ARM, IBM Processors Vulnerable

There has been a lot of research conducted to determine the root cause of speculative execution attacks against modern processors and as it turns out the recently released research paper by the researchers at the Graz University of Technology explains the exploitation of pre-fetching effect more accurately than the previously published papers. It clearly states that…
Read more