When we hear the word hacking, we picture a person busy operating in a dark room, working on big machines surrounded by bully racks and blinking lights. Thanks to the high-tech Hollywood movies, hackers have gained a bad reputation. But, trust us, ethical hacking is a...
Personal data can be accessed on the internet via so-called XS-Leaks. A large number of browsers are affected. Cross-site leaks, or XS-Leaks, are 14 new types of attacks against web browsers uncovered by IT security specialists. A rogue website can use XS-Leaks to...
According to various reports from Reuters and The Washington Post, Apple warned many U.S. Embassy and State Department employees that their iPhones may have been targeted by an unknown assailant employing state-sponsored spyware manufactured by the controversial...
Did you know worldwide cyber-security spending will be close to $133.7 billion by 2022? This prediction by Gartner Inc. is a response to growing cyber-attacks that are motivating businesses to invest more on cyber-security. But there is also a positive side to the...
IKEA is fighting a hack in which threat actors are utilising stolen reply-chain emails to target employees in internal phishing assaults. Threat actors steal authentic corporate email and then reply with links to malicious documents that install malware on...
With the increased focus on ransomware attacks and cyber-physical systems, more businesses are giving priority to risk leaders and security. After the pandemic, there was an increase in the number of cyber-attacks. Ransomware attacks make networks more vulnerable,...
The Lookout Threat Lab has discovered a new rooting malware that is available on Google Play as well as popular third-party stores like the Amazon Appstore and the Samsung Galaxy Store. The malware was given the name “AbstractEmu” because it used code...
GitLab released a security update on April 14, 2021, to address CVE-2021-22205, a severe remote code execution vulnerability in the web interface. GitLab defined the vulnerability at the time as an authenticated vulnerability caused by passing user-supplied photos to...
The majority of the following essay was written in early 2020, while the vendor was attempting to recover a significant number of infected devices. We discussed our results with the vendor, as well as CNCERT, and opted not to publish the blog while the vendor’s...
The Posting of a Ransomware Lure on Japanese Minecraft ForumsGamers create “alt” (alternative) accounts in Minecraft for a variety of reasons (both good and bad), including the ability to antagonize/troll other players without having their main account...