Friday, August 14, 2020

Security

GitHub Warns Developers About Malware- Spreading Java Projects

On Thursday, GitHub issued a warning about a new malware that's spreading through open-source NetBeans projects. The malware dubbed "Octopus Scanner" by security researchers...
Strandhogg 2.0 Android bug

Strandhogg 2.0: A “Nearly Undetectable” Android Bug That Tricks Users

Security researchers have found a vulnerability in Android devices that could allow hackers to steal data from users by tricking them into typing passwords...
Trump confidential data

Hackers: Pay $42 Million Or We’ll Release Trump’s “Dirty Laundry”

The REvil ransomware group that targeted A-grade celebrities last week is now demanding a ransom of $42 million from President Donald Trump otherwise, they'll...
Most exploited vulnerabilities

These Are The Top 10 Most Exploited Vulnerabilities In Past 3 years

Cybersecurity is a matter of grave concern, and bad actors are actively involved in exploiting vulnerabilities in systems. Today, the US cybersecurity agencies have...
Intel Thunderspy attack

Any PC Manufactured Before 2019 Is Vulnerable To ‘Thunderspy’ Attack

Björn Ruytenberg, a security researcher from Eindhoven University of Technology, has revealed that all the PCs manufactured before 2019 could be hacked, thanks to...
Anime botnet cereals

Hacker Hacked IoT Devices For 8 Years Just To Download Free Anime

A hacker operated a network of botnets and exploited vulnerable D-Link Network Attached Storage (NAS) and Network Video Recorders (NVR) devices for 8 years,...
Microsoft bug bounty program

Microsoft Announces $100,000 Reward For Hacking Its Custom Linux OS

Microsoft has announced a bug bounty program under which it is offering a reward of $100,000 to anyone who manages to hack its custom...
Linux Vulnerability

‘Kaiji’ Malware Targets Linux Servers, IoT Devices Via DDoS Attacks

Security researchers at Intezer Labs and an individual researcher named MalwareMustDie have discovered a new malware strain that affects Linux-based servers and IoT devices. Reports suggest that the...
Zoom End to end encryption

Beware! Hackers Are Using Zoom App To Install Spying Malware

With the Coronavirus lockdown affecting industries in their day to day functioning, video conferencing apps are making life easier for businesses. One particular video conferencing...
Lineage OS hack

LineageOS: Hackers Breach Servers Of Most Popular Android Custom ROM

On Saturday, hackers broke into LineageOS servers via an unpatched vulnerability and took control of the main infrastructure. LineageOS is one of the most popular custom...