Cybersecurity News

Top Software Testing Services

Windows-Native PDF Viewers Extremely Vulnerable

A group of cybersecurity researchers found and unveiled that by far most of the most well-known Windows-local PDF viewers were defenseless (or vulnerable) against numerous assault strategies abusing standard PDF services. A few PDF software brands were defenseless against the most genuine assaults, which brought about leaking of local files, file write access, and remote…
Read more

NPM Packages Intruded By The Malware That Steals Discord User Data

NPM (Node Package Manager) is a code repository (a code repository is where snippets and patches of source code for software programs are archived in an organized way) where sharing and reusing of code blocks is done by Javascript developers, has been added with three malevolent software packages. These packages may have been used as…
Read more

Hacking Group FIN11 Changes Strategies, Now Using Clop Ransomware

As per the incident response researchers of the FireEye, the FIN11 monetary hacker group is moving its strategies from stealing credentials and phishing to ransomware and extortion. FIN11 is remarkable for its utter moments and activities, known to approach five unique wide-scale email phishing operations weekly. For Now, it is hard to name a specific…
Read more

Cybersecurity Researchers Suggests That Joe Biden’s Peloton Bike Can Cause Cybersecurity Threat

Joe Biden’s wellness system may conceivably cause a surprising migraine for security administrations equipped with the protection of the new president in the White House, with his Peloton exercise bike believed by few experts as a strong cybersecurity threat. Biden is accounted for to begin every day with an exercise in a rec center outfitted…
Read more

Discovery Of An Exploit That Allows Kindle E-Reader Takeover Was Awarded $18000 By Amazon

A cybersecurity researcher, Yogev Bar-On at Realmode Labs, an Israel-based cybersecurity consulting firm, discovered an exploit named as KindleDrip in October 2020. According to Amazon, to execute this attack successfully, it involves exploiting three different security flaws. The principal weakness in the exploit was identified with the “Send to Kindle” service, which permits clients to…
Read more

Patched Bugs Of Signal, FB Messenger, JioChat Apps Explained By Google

A severe bug was accounted in January 2019 in Apple’s FaceTime group chats service that made it workable for clients to start a FaceTime video call and snoop on subjects by adding their own numbers as another individual in a gathering talk even earlier than the individual on the opposite side acknowledged the approaching call.…
Read more

DNSpooq Vulnerabilities Allow DNS Cache Poisoning Of Millions of Devices

As per JSOF which is an Israel-based cybersecurity company, that discovered the security issues, explaining that hundreds of thousands of devices, because of seven security defects in dnsmasq, may be vulnerable to DNS cache poisoning (DNS caching and forwarding softwares that are commonly used in various IoT devices, routers, servers, desktop, and mobile phones) and…
Read more

No Simple Fix For SolarWinds Supply Chain Attack – Says FireEye

The cybersecurity firm FireEye, who discovered the SolarWinds Supply Chain Attack, said that this almost seven-month-old cyber attack still remains in its early stage with no development in the analysis of the attack and tracing the intruder. This attack has massively and shockingly impacted the private and government sector of the US. On Tuesday, cybersecurity…
Read more

Access Control Protection Bypass Patched By CoTURN – A VoIP Flaw

Cybersecurity researchers have recently found that using a vulnerability attackers/hackers could avoid the security measures of the CoTURN server’s default access control and gain access to network services past the firewall. One of the analysts presented an assumption that, under particular conditions, an attacker/hacker could proceed to accomplish remote code execution (RCE), in spite of…
Read more

Linux Device Vulnerabilities Being Exploited By FreakOut Malware

Specialists are cautioning about a novel malware version that is focusing on Linux gadgets, to add endpoints to a botnet to be used in DDoS (distributed-denial-of-service) assaults and crypto mining. The malware variation, called FreakOut, has an assortment of abilities. Those incorporate port filtering, data gathering, and data packet and network sniffing. It is effectively…
Read more