An old vulnerability (CVE-2021-22205) is being actively exploited for controlling on-premise Gitlab servers, Rapid7 researcher Jacob Baines remarks. What makes it worse is at…
Suryash Kumar
Latest posts - Page 9
Who’s behind the Stalkerware network of compromising several phones?
Developed states are backing spyware that can remotely hack into iPhones. Governments are buying and using these hacking tools to target dissent—journalists, activists and…
Google is donating $15 million for the Ukraine crisis and is also targeting Russian media and people
Google said It’s helping those leaving Ukraine- war-affected regions. Google stated that Google.org and Google employees are donating $15 million for relief efforts in…
Pentest as a service Platform: What’s new with Bugdazz 2.0.1?
Pentest as a service platform helps to smoothly manage pentests. Bugdazz 2.0.1 has been released, and it has several improvements over its previous version.…
Data privacy bill: how individuals and companies are affected?
In 2017, the Indian Supreme Court held that the right to privacy was a fundamental right, and afterwards, the Indian Parliament drafted a data…
TrickBot malware operators close their botnet infrastructure
TrickBot, a modular Windows crimeware platform, has shut its infrastructure on Thursday after reports came of its impending retirement. TrickBot was inactive for two…
Entropy malware planted using Dridex malware on affected computers
Dridex, a general-purpose malware, and Entropy, a less known ransomware strain, share similarities as a result of operators playing with names in their extortion…
OpenSea’s users have reported losing $1.7 million in a phishing attack
OpenSea’s NFT marketplace vulnerability in the smart contract upgrade process exploited by malicious actors. The malicious actors executed a phishing attack against 17 users…
Hackers exploit unpatched Microsoft SQL using Cobalt Strike
Threat actors have targeted vulnerable internet-facing Microsft SQL (MS SQL) servers. The attacks entail planting the Cobalt Strike adversary simulation tool in the targeted…
Android vulnerabilities are being exploited to register disposable accounts
A study of SMS phone-verified account (PVA) services has revealed a rogue platform with a botnet underneath. The rogue platform has infected thousands of…