Cyberattacks are happening more often across a variety of industries. Everyone is affected by the increase in cybercrime, although some industries are more vulnerable…
General
Emotet Downloader Document Execution Relies on Regsvr32
Executive Summary This document examines a recent Emotet infiltration and describes the system installation of the Emotet payload. The main findings are: Excel macros…
Golang-based Applications are Affected by a New “ParseThru” Parameter Smuggling Vulnerability
A new vulnerability called ParseThru has been identified by security experts that affects Golang-based applications and might be used to get unauthorised access to…
Attacks Using Path Traversal Are Susceptible To Millions Of Arris Routers
The MIT-licensed muhttpd web server has security flaws, according to a report by security expert Derek Abdine. The Arris firmware, which is featured in…
Malware That Steals Credentials Raccoon Updated To More Effectively Collect Passwords
An examination of the new version of the well-known Raccoon Stealer virus has been published by security specialists from the online system Zscaler. The…
More Than 3,200 Apps Leak Twitter API Keys, Some of Which Enable Account Takeover
Researchers in cybersecurity have found 3,207 mobile apps that expose Twitter API keys to the public, potentially allowing a threat actor to hijack users’…
It’s Time For India to Implement a Unified Cybersecurity Law Since Cyber Sovereignty is at Stake
The Information Technology Act of 2000 and the National Cyber Security Policy of 2013, among others, are examples of decades-old legislative architecture that cannot…
If Uber Wants To Reach A Settlement With The DoJ, It Must Admit To Lying. And So It Was
The 2016 data leak that affected Uber’s 57 million users and drivers was hushed up. The DOJ (US Department of Justice) and the taxi…
Nuki Smart Locks Have Several Security Flaws
Numerous Nuki Smart locks have security weaknesses, according to researchers. The availability, confidentiality, and integrity of the smart locks could all be impacted by…
Government Ransomware Attack Reports Are Declining, But Appearances Can Be Deceiving
The Ransomware Task Force, a group of about 60 cybersecurity experts from the tech sector and the public sector, published a report earlier this…