Security


Cornell University academics launched a CanaryTrap tool for detecting data misuse: 16 Facebook apps caught recording personal emails A group of academics[1], namely Shehroze Farooqi, Maaz Musa, Zubair Shafiq, and Fareed Zaffar, from Cornell University in Ithaca, New York, has found a fully functional software for detecting data misuse by third-party […]

16 Facebook apps were caught red-handed by CanaryTrap tool


Watering hole attacks against the Kurdish community in Syria and Turkey aiming to exfiltrate data revealed Retooled spyware got used in new advanced StrongPity hacker attacks.[1] Cybersecurity researchers revealed that attacks in Syria and Turkey with surveillance and intelligence exfiltration purposes were held by the persistent threat operators known as […]

StrongPity APT back: targeting Syria and Turkey with new malware ...




Hackers used Google Analytics to steal credit card details via infected e-commerce sites Google servers and functions of the Google Analytics platform got misused by hackers to steal information submitted by customers.[1] These hackers also managed to bypass the web security. Content Security Policy with the help of Google Analytics […]

Google Analytics used so steal data from customers of online ...



Cyber company in India offered hacking services to help others spy on email accounts of politicians, journalists, and investors Litlle-known Indian IT firm secretly offered the global hackers-for-hire service that helped to spy on email accounts over the span of seven years.[1] The New Dehli-based BellTroX InfoTech Services firm targeted officials […]

Indian IT firm offered a global hackers-for-hire service for 7 ...



System takeover is possible through new SAP Adaptive Server Enterprise vulnerabilities  Flaws in SAP Adaptive Server Enterprise (ASE) allow unauthorized users to gain full control of the database and operating systems in some cases,[1] according to new research conducted by the Trustwave team.[2] These six flaws in the Sybase Adaptive Server […]

Researchers reveal that patched SAP ASE flaws could lead to ...



Joomla open-source content management system suffers a security incident that revealed personal details of customers The member of the Joomla Resources Directory team left the unencrypted full backup of the JDR site on a nonsecured Amazon Web Services S3 bucket operated by the third-party company.[1] This data breach impacted more […]

Joomla suffers data breach: encrypted passwords of 2,700 users exposed