Cornell University academics launched a CanaryTrap tool for detecting data misuse: 16 Facebook apps caught recording personal emails A group of academics[1], namely Shehroze Farooqi, Maaz Musa, Zubair Shafiq, and Fareed Zaffar, from Cornell University in Ithaca, New York, has found a fully functional software for detecting data misuse by third-party […]
Security
Watering hole attacks against the Kurdish community in Syria and Turkey aiming to exfiltrate data revealed Retooled spyware got used in new advanced StrongPity hacker attacks.[1] Cybersecurity researchers revealed that attacks in Syria and Turkey with surveillance and intelligence exfiltration purposes were held by the persistent threat operators known as […]
StrongPity APT back: targeting Syria and Turkey with new malware ...
The heavily exploited Magento 1.x bugs get patched when the first version reaches end-of-life on June 30th Various service providers like Visa and Mastercard warns other online store owners about the end of Magento 1.x.[1] There are tons of e-commerce providers that still run the Magento CMS, so they can […]
The first release of Magento platform reaches the end: updates ...
Hackers used Google Analytics to steal credit card details via infected e-commerce sites Google servers and functions of the Google Analytics platform got misused by hackers to steal information submitted by customers.[1] These hackers also managed to bypass the web security. Content Security Policy with the help of Google Analytics […]
Google Analytics used so steal data from customers of online ...
Get a unique ID for secure remote access to your website or video streaming services with dedicated IP A static or fixed IP address[1] is the one that is manually configured for the particular device instead of the one that is assigned by the internet providers. It is not changing […]
Get the best dedicated IP VPN to enjoy risk-free online ...
Cyber company in India offered hacking services to help others spy on email accounts of politicians, journalists, and investors Litlle-known Indian IT firm secretly offered the global hackers-for-hire service that helped to spy on email accounts over the span of seven years.[1] The New Dehli-based BellTroX InfoTech Services firm targeted officials […]
Indian IT firm offered a global hackers-for-hire service for 7 ...
System takeover is possible through new SAP Adaptive Server Enterprise vulnerabilities Flaws in SAP Adaptive Server Enterprise (ASE) allow unauthorized users to gain full control of the database and operating systems in some cases,[1] according to new research conducted by the Trustwave team.[2] These six flaws in the Sybase Adaptive Server […]
Researchers reveal that patched SAP ASE flaws could lead to ...
The railroad service Amtrak claims that user account data might have been breached A security incident was reported by the National Railroad Passenger Corporation, also known as Amtrak. The rail service provider suffered a data breach after an unauthorized party managed to breach into the servers and access some Amtrak Guest […]
Amtrak data breach may have disclosed customer data
Joomla open-source content management system suffers a security incident that revealed personal details of customers The member of the Joomla Resources Directory team left the unencrypted full backup of the JDR site on a nonsecured Amazon Web Services S3 bucket operated by the third-party company.[1] This data breach impacted more […]
Joomla suffers data breach: encrypted passwords of 2,700 users exposed
Video games exploited once again – threat actors post fake videos on YouTube promoting an alleged Valorant mobile app Highly anticipated first-person shooter Valorant has been in the vicinity of bad actors recently, as the next Riot’s game is played by millions each day. The official release for the game […]