It was discovered that hundreds of job applicants’ personal information had been compromised due to a glitch on Texas Right to Life website that allowed anyone to view their resumes, which were stored in an unencrypted directory. Technically speaking, the…
Latest posts - Page 82
Dropbox: PoC release for Ghostscript vulnerability that revealed Airbnb
Malicious programmers have delivered a proof-of-concept (PoC) code that takes advantage of and as of late displayed vulnerability in more seasoned yet generally utilized renditions of Ghostscript, the famous server-side picture conversion programming bundle that revealed Airbnb and Dropbox. Security…
Ragnar Locker Ransomware gang threatens to release stolen data
Using a new method, the Ragnar Locker ransomware gang threatens to release the stolen data if the victim does not pay the ransom. It was only after this that the group came up with the idea of enlisting the services…
Remote Code Execution Security gap fixed by NPM package
An extremely well-known NPM bundle called ‘pac-resolver’ for the JavaScript programming language has been fixed to address a remote code execution gap that could influence a great deal of Node.js applications. The remote code execution security gap in the pac-resolver…
IoT attacks : doubling in six months.
More than 100 percent more IoT devices were attacked in the first six months of 2021, according to researchers. After analyzing its honeypot telemetry, Kaspersky discovered more than 1.5 billion IoT attacks, up from 639 million in the previous half…
Playbook by Ransomware-as-a-Service provider Leaked Source Code
According to researchers, Conti, the group that provides ransomware as a service (RAAS), just exposed their playbook. In addition to the Cobalt Strike handbook that was used in the creation of the playbook, it has provided a wealth of information…
Conti Playbook leaked: Did you hear about it?
Analysts as of late got a playbook that was leaked connected to Conti, the Ransomware-as-a-Service (RaaS) gang. It has uncovered plenty of data about the attackers that likewise contains the Cobalt Strike manual that was referred to while making the…
USB Malware drops using device invented by UK
The United Kingdom researchers say that the device will reduce the risk of harmful USB malware. With a patent from the Indian government, the “external scanning device” was developed at Liverpool Hope University and will shortly be put into production.…
Email is still vulnerable: Brute Force Attacks increasing
Emails are still a viable attack vector, despite the fact that phishing techniques are constantly being improved. Threat actors are using brute force attacks to obtain access to email accounts, according to a report from Abnormal Security. Brute force attacks…
Quantum Security feature Freeze by Google due to vulnerable middleware
Google said earlier in the week that it briefly shut off its quantum security include in Chrome after it got bug reports that defective systems administration middleware gadgets have been causing unforeseen site association disappointments for a couple of clients…