Category: CyberSecurityNews

Why Do You Need a Cloud-native Web Application Firewall (WAF)? 
29
May
2023

Why Do You Need a Cloud-native Web Application Firewall (WAF)? 

With your on-premise security solution comprising hardware, software, signatures, rules, and even machine learning, you may think your applications are…

COSMICENERGY OT Malware
29
May
2023

OT Malware Causes Electric Power Disruption

A Russian government-linked malware targeting power transmission was discovered recently by researchers at Mandiant during research, suggesting its potential use…

OAuth Framework Flaw
29
May
2023

Critical OAuth Framework Flaw Let Attackers Hijack Accounts

OAuth is the modern authentication mechanism most applications use to ease off the signing by creating a cross-allow application access…

Tesla Data Leak Safety
27
May
2023

Tesla Data Leak Exposes Thousands Of Safety Complaints

According to a report in the German newspaper Handelsblatt, Tesla Inc consumers made over 2,400 complaints about self-acceleration issues and 1,500…

Windows XP Activation Algorithm
27
May
2023

Windows XP Activation Algorithm Cracked

Getting around Windows XP’s activation scheme has never been an impossible challenge for individuals with adequate time, a sense of…

Chinese Hackers Attack US Critical Infrastructure
26
May
2023

Chinese Hackers Attack US Critical Infrastructure

The US and global cybersecurity agencies have issued a joint advisory to bring attention to the activities of “Volt Typhoon,”…

Wireshark 4.0.6
25
May
2023

Wireshark 4.0.6 Released – What’s New!

Wireshark, a leading network packet analyzer, recently launched version 4.0.6, featuring bug fixes, protocol updates, and a few improvements. It…

ABB Hack
25
May
2023

ABB Hack – Attackers Dropped Ransomware on IT Systems

As per reports, ABB (ASEA Brown Boveri), the technological giant in electrification and automation, has been impacted by an IT…

IT Security Analyst Pleaded Guilty
24
May
2023

IT Security Analyst Pleaded Guilty for Attacking his Own Company

The insider threat has been a significant concern for organizations in terms of security. Though they do not happen very…

Retrieve Deleted WhatsApp Messages
24
May
2023

How the Forensic Tools Can Retrieve Deleted WhatsApp Messages

Law enforcement agencies can potentially retrieve deleted data, including from encrypted chat apps like WhatsApp if they acquire and search…

Bug Bounty Android
24
May
2023

Bug Bounty program for Android Apps

Google is well-known for its rewards for Security Researchers. A Simple XSS in any Google subdomain will reward you $1337….

Hackers Use 'URL Obfuscation'
24
May
2023

Hackers Use ‘URL Obfuscation’ Technique to Deliver Malware

Mandiant researchers recently identified “URL Schema Obfuscation” as an adversary technique that conceals the final URL destination by manipulating the…