A new vulnerability called ParseThru has been identified by security experts that affects Golang-based applications and might be used to get unauthorised access to…
Srivani Reddy
Latest posts - Page 29
Attacks Using Path Traversal Are Susceptible To Millions Of Arris Routers
The MIT-licensed muhttpd web server has security flaws, according to a report by security expert Derek Abdine. The Arris firmware, which is featured in…
Malware That Steals Credentials Raccoon Updated To More Effectively Collect Passwords
An examination of the new version of the well-known Raccoon Stealer virus has been published by security specialists from the online system Zscaler. The…
More Than 3,200 Apps Leak Twitter API Keys, Some of Which Enable Account Takeover
Researchers in cybersecurity have found 3,207 mobile apps that expose Twitter API keys to the public, potentially allowing a threat actor to hijack users’…
It’s Time For India to Implement a Unified Cybersecurity Law Since Cyber Sovereignty is at Stake
The Information Technology Act of 2000 and the National Cyber Security Policy of 2013, among others, are examples of decades-old legislative architecture that cannot…
If Uber Wants To Reach A Settlement With The DoJ, It Must Admit To Lying. And So It Was
The 2016 data leak that affected Uber’s 57 million users and drivers was hushed up. The DOJ (US Department of Justice) and the taxi…
Nuki Smart Locks Have Several Security Flaws
Numerous Nuki Smart locks have security weaknesses, according to researchers. The availability, confidentiality, and integrity of the smart locks could all be impacted by…
Government Ransomware Attack Reports Are Declining, But Appearances Can Be Deceiving
The Ransomware Task Force, a group of about 60 cybersecurity experts from the tech sector and the public sector, published a report earlier this…
How Mercenary Hackers Sway Litigation Battles
Indian cyber mercenaries are hacking parties involved in lawsuits around the world, according to a treasure trove of thousands of email records found by…
Workflow Weaknesses In GitHub Actions Gave Applications Like Logstash Write Access
Worst-case possibilities included malicious construction and greater infrastructural compromise. Multiple workflows of the well-known continuous integration and development (CI/CD) service GitHub Actions have been…