WarXing

What is WarXing in Cyber Security? What are the Benefits?

You might have heard about WarXing; here you will get detailed information about that. WarXing is always searching for Wi-Fi networks because in this hyper-connected world users need to need a stable internet connection....
OSINT Tools

Top 10 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing 2021

We all know very well that getting or gathering any information by using various tools become really easy. In this article, we have discussed various OSINT tools, as if we search over the internet,...
System Admin of FIN7 Hacking Group

System Admin of FIN7 Hacking Group Sentenced to Ten Years in Prison

Fedir Hladyr, 35, a Ukrainian national, served as a high-level manager and systems administrator for FIN7.  He was arrested in Dresden, Germany, in 2018 at the request of U.S. law enforcement and was extradited...
WRECK DNS

100 Million+ Devices Affected With Critical WRECK DNS Implementation Flaws

JSOF team together with Forescout Research Labs, have revealed a set of nine vulnerabilities related to Domain Name System (DNS) implementations, causing either Denial of Service (DoS) or Remote Code Execution (RCE). This vulnerability set,...
pppd

Data Encryption: Why Is It So Important?

No one would have imagined a few years ago that cybercrime would become such a big concern as it is today. Billions of attacks are launched against individual devices and entire company networks each...
Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers

Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers

Hackers spear-phishing business professionals on LinkedIn with fake job offers and infecting them with malware warns eSentire. eSentire, a leading cybersecurity solutions provider, is warning enterprises and individuals to beware of a new spear-phishing attack...
New Botnet Reuse the Mirai Framework to Perform DDoS Attack on Android Devices

New Botnet Reuse the Mirai Framework to Perform DDoS Attack on Android Devices

Recently, the Chinese security firm Qihoo 360's networking security division Netlab has discovered a nascent malware campaign.  This campaign has been spotted co-opting the Android devices into a botnet along with the principal objective of...
Hackers Hijacking Google Search Results via Backdoored Browser Extensions

Hackers Hijacking Google Search Results via Backdoored Browser Extensions

Cybersecurity researchers at Avast have recently reported a huge campaign comprised of dozens of malicious Chrome and Edge browser extensions along with more than three million installations in whole.  This campaign has collectively termed "CacheFlow"...
Hackers Can Exploit Windows RDP Servers to Amplify DDoS Attacks

Hackers Can Exploit Windows RDP Servers to Amplify DDoS Attacks

These days, Windows Remote Desktop Protocol (RDP) servers are being exploited by DDoS-for-hire services to expand Distributed Denial of Service (DDoS) attacks. However, we all know that  Microsoft is one of the latest major...
How to Protect Your IoT Devices From Botnet Attacks

How to Protect Your IoT Devices From Botnet Attacks

IoT devices allow us to connect everything and make our environment smart. However, the technology has always been marred by insecurity, with manufacturers and security organizations still unable to ensure the safety of these...