Posts From Mo Moin

Security researcher successfully Jailbreak the latest version of iOS 12.4 by taking advantage of the unpatched vulnerability that has been already fixed by Apple, and the Jailbreak creates an easy way to hack any vulnerable iPhone and iPad. Apple accidentally

VideoLAN has released VLC 3.0.8 with the fix for 13 security vulnerabilities that allows a remote attacker to crash the VLC player and to execute arbitrary code on the machine with the user privileges. The release fixes 13 security vulnerabilities

Webmin, the popular open-source web-based interface for Unix admin contained a remote code execution vulnerability for more than a year. Webmin is an open-source web-based interface for system administration for Linux and Unix. It allows users using web browsers to

A study conducted by researchers at Cyjax revealed that organizations expose sensitive data via sandboxes used for malware analysis. Experts at the threat intelligence firm Cyjax analyzed file uploaded by organizations via malware analysis sandboxes and discovered that they were

Research giant Gartner Inc. has named BlackBerry a Magic Quadrant Leader for the forth consecutive year. The Canadian multinational is one of six vendors to be handed the title in 2019 Gartner Magic Quadrant for Unified Endpoint Management Tools report.

About the only thing shifting as fast as the cyber threat landscape is the typical enterprise’s org chart. As enterprises aim to keep pace with the rapidly evolving digital economy, many are restructuring internal departments, hiring criteria and the processes

The state of Texas has come under fire from a coordinated ransomware attack affecting over 20 local authorities. The Texas Department of Information Resources (DIR) released an updated statement over the weekend detailing its response to the attacks, which occurred

A new app dubbed Bluetana allows users to detect Bluetooth based skimmers hidden in gas pumps. These Bluetooth skimmers also attackers to connect the payment data safely by sitting inside a car. Skimmers are nothing but the malicious payment card

Police chiefs are warning of delays to investigations and court cases after it emerged that a ransomware attack on a forensic services firm led to a backlog of 20,000 cases. Eurofins Scientific, the largest provider of its kind in the

This article covers Active directory penetration testing that can help for penetration testers and security experts who want to secure their network. “Active Directory” Called as “AD” is a directory service that Microsoft developed for the Windows domain network. Using

Researchers discovered nearly 85 malicious adware apps in Google play store that intended to upload for delivering adware and monetize from affected Android devices. These Fraudulent adware apps were installed over 8 million times from the Google play store, and

The DanaBot banking Trojan continues to evolve and spread across the continents, now moving from Australia to European countries. DanaBot is a multi-stage modular banking Trojan written in Delphi that first appeared on the threat landscape in 2018. The malware

A group of seven Ethical hackers who were exclusively allowed to test the flight system for a U.S. military fighter jet, in result, they found severe vulnerabilities in critical F-15 fighter jetsystems. The flaws allowed them to take control of

A security researcher demonstrated how to bypass a fix released by Valve for a recently discovered Steam vulnerability re-enabling the attack. A few days ago, the security experts Matt Nelson and Vasily Kravets separately disclosed a privilege escalation vulnerability in

It’s official: 1.5% of web logins use breached credentials, according to research published by Google. The company analyzed its own data to reach that number, which it presented at the USENIX conference this week. Many websites still rely on only

The number of data breaches spiked dramatically in the first half of this year compared to previous years, according to a report from vulnerability intelligence company Risk Based Security. Its analysis found that breach numbers for the first six months