Archive

Security researchers have discovered a number of flaws in Git that could have enabled hackers to run remote code on a victim’s PC. Git is version control system used for source code management in software development. According to a advisory

Russia’s communications regulator Roskomnadzor has threatened Apple to face the consequences if the company does not remove secure messaging app Telegram from its App Store. Back in April, the Russian government banned Telegram in the country for the company’s refusal

Enterprises and their Security Operations Centers (SOCs) are under siege. Security events are being triggered from all corners of the security stack – from the firewall, endpoints, and servers, from intrusion detection systems and other security solutions. What’s more is

After an Alexa-enabled Echo device recorded and shared a private conversation of its unknowing owners, the tech industry – and the public – is casting a wary eye on voice assistant privacy issues. On Thursday, news emerged that a Portland

The popular home automation protocol Z-Wave, used by millions of IoT devices, is vulnerable to a downgrade attack that could allow an adversary to take control of targeted devices, according to researchers. Z-Wave is a wireless protocol used by 2,400

The global DNS firewall market is expected to grow from USD 90.5 million in 2018 to USD 169.7 million by 2023, at a Compound Annual Growth Rate (CAGR) of 13.4% during the forecast period. The extreme vulnerability of DNS to

Recently discovered malware steals cache data and secure messaging sessions from the desktop version of encrypted messaging service Telegram. The malware, dubbed TeleGrab, leverages weak default settings in the design of Telegram’s desktop version along with the desktop’s lack of

Yet another variant of the Mirai botnet has appeared on the scene, but this one has a twist: The code is integrated with at least three exploits that target unpatched IoT devices, including closed-circuit cameras and Netgear routers. It also

Google plans to remove the “secure” label from HTTPS websites starting in September 2018, a move intended to acknowledge HTTPS as the standard for browser security. Users should expect all the sites they visit to be secured with HTTPS, the

MESCON Conference

MESCON : Regional cyber security conference to reach out to more than 7000+ security professionals. MESCON brings to you the best of industry experts to talk on various pressing topics that help the security community to learn and address the

Security researchers have discovered a large Satori botnet that is scanning the internet for exposed Ethereum cryptocurrency mining rigs. According to a blog post by researchers at Qihoo 360 Netlab, hackers are targeting port 3333. This is frequently used for

TrapX Security®, the global leader in deception-based advanced cybersecurity defense announced today it has joined forces with Cylance®, in order to improve cybersecurity and stop advanced threats. TrapX DeceptionGrid™ and CylancePROTECT® integrated solution provides accurate, real-time threat detection, visibility, and

For about an hour on the night of a primary election in May, residents in Knox County, Tennessee, couldn’t tell who was winning. Hackers had taken down the county’s election tracking website, crashing the page at 8 p.m., right as

A British computer expert who helped shut down the NHS ‘WannaCry’ cyber attack has been charged in the US with creating banking malware. Marcus Hutchins, 23, has been charged with six counts of creating and distributing malware known as Kronos.

A week after issuing updates on Patch Tuesday, Adobe has posted patches for a second slew of 24 critical vulnerabilities, which have a higher risk of being exploited. This week’s crop of vulnerabilities, of which there were 47 overall, impact

Researchers have discovered a phishing campaign that infected Android devices with custom surveillance-ware bent on extracting data from top officials, primarily in the Middle East. Researchers at Lookout Security told Threatpost that the tool, dubbed Stealth Mango, has been used