Attendees at Black Hat USA have learned that the popular open-source hacking tool GoTestWAF has developed into the first utility of its kind to assess API security platforms. The security testing tool, which was introduced in April 2020, mimics OWASP…
Latest posts - Page 44
Hackers Exploited Crypto Platform RenBridge To Launder $540 mn: Reports
More than half a billion dollars have been laundered in crypto assets originating from theft, fraud, ransomware and various other types of criminal activity since 2020, a new report has revealed The report by Blockchain analysis group Elliptic said one…
Supply Chain Cybersecurity: Everyone’s Responsibility
This week, I had a conversation with a new client who revealed that they are eager to solve various internal problems relating to their IT systems. They explained how their company has been negatively impacted by service failures and delays…
A New Hacker Forum Adopts A Pro-Ukrainian Position
The only aim of the politically motivated website DUMPS is threatening behavior against Russia and Belarus. Researchers have discovered that a new hacker forum is adopting an unusual political position to support Ukraine in its conflict with Russia by exclusively…
How A Security Concern Was Caused By An IP Address Compromise At The DRDO Missile Lab
The Defence Research and Development Organization (DRDO), which is in charge of the nation’s missile development projects, suffered a significant breach that the Indian security establishment discovered, exposing security grid flaws. The breach involved the misappropriation of the company’s extremely…
DeathStalker’s VileRAT Continues to Target Foreign and Crypto Exchanges
The menace actor regarded as DeathStalker has continued to goal and disrupt foreign and cryptocurrency exchanges around the planet in the course of 2022 utilizing the VileRAT malware, in accordance with security researchers from Kaspersky. The findings are in-depth in…
Convergence and Adoption of AI and ML Countering the Cyber Threat
During the last few years, we have witnessed an increase in advanced cyber attacks. Cybercriminals utilize the advanced technology to breach the digital boundary and exploit enterprises’ security vulnerabilities. No industry feels secure; security professionals do their utmost to close…
Cisco Hacked By Yanluowang Ransomware Gang, 2.8GB Allegedly Stolen
Cisco confirmed today that the Yanluowang ransomware group breached its corporate network in late May and that the actor tried to extort them under the threat of leaking stolen files online. The company revealed that the attackers could only harvest…
Best Woocomerce Fraud Prevention Plugin
Online shopping is becoming more popular every year. Revenue from retail e-commerce in the United States was estimated at roughly 768 billion U.S. dollars in 2021. The Statista Digital Market Outlook forecasts that by 2025, online shopping revenue in the…
Sites That Leak Ransomware Encourage More Attacks
Victims Are Frequently Attacked at the Same Time by Several Ransomware Groups Being posted on a ransomware leak website isn’t just embarrassing; it could also open you vulnerable to a follow-up attack from other ransomware gangs that believe the original…