Attacks

Hackers are Guilty of Software Breach that is Shielded

Two computer hackers pleaded guilty to developing an extort scheme that tangled Uber in a year long cover-up of a data breach that stolen sensitive information from approximately 57 million passengers and drivers of the ride-hailing service. The pleas entered Wednesday at the federal court of Brandon Charles Glover and Vasile Mereacre in San Jose,

[ Read More ]

Researchers Warn Against the New Cache-Poisoned Method of Attack

A team of German security researchers has developed a new class of Web cache toxic attacks that could make victim services unattainable. In addition to providing security against denial-of-service attacks (DoS), the cache was designed to lower the amount of network traffic by reusing HTTP answers and helping applications to scale. A new attack involving

[ Read More ]

Common Ways For Countering Privileged Identity Theft Attacks

Work efficiency cannot be improved without an internal/external network environment these days; successful organizations are all data-driven entities. However, while the Internet comes with convenience, there is a risk of leaking personal information. There are various causes of identity theft, but one is sophisticated of malware such as targeted attack emails. Targeted attack emails are

[ Read More ]

Why The Worst Data Breaches Of 2019 Might Look Like A Nightmare

The year 2018 has seen companies hit with sizable fines and settlements due to data breaches. For example, Uber’s poor handling of its 2016 breach cost the company close to $150 million. And weakly protected, heavily-regulated health data has cost medical facilities big money, resulting in increasingly large fines from the U.S. Department of Health

[ Read More ]

jQuery JavaScript Library, Target Of Pollution Attacks

We can safely say that the Internet and the World Wide Web today will not be possible without the use of a scripting language that most people often overlook, Javascript. Whether we like it or not, JavaScript made the web as interactive, usable and convenient to use, in fact disabling scripting will break the functionality

[ Read More ]

Triton Hacker Group Attacks Saudi Petrochemical Company Again

FireEye, a mainstream cybersecurity consulting firm has recently exposed that a state-funded malware development group was behind an attempt to blow a Saudi-based Petrochemical facility using malware a second time. Called the “Triton” group, they have developed the eponymous malware, it takes control of machinery in order to overwork itself with the chance of eventual

[ Read More ]

Mimikatz: A Deeper Look At Blackhat And Whitehat Hackers’ Shared Tool

There is a thin line that separates black hat hackers (malicious hackers) and white hat hackers (ethical hackers), both possess skills that can harm networks, systems, and computers if they wish to do so. The good thing is ethical hackers helps lessen the chances that blackhat hackers become successful with their campaigns. They do this

[ Read More ]

Twitter Vulnerability that Allows to Tweet on Other People’s Behalf

After various social network hack, particularly with regards to Facebook, many have started giving careful consideration to the security of the social media account. Along these lines, a British security analyst as of late, figured out a genuine flaw on Twitter. Richard De Vere is an ethical hacker and security researcher, who reported about, the Twitter

[ Read More ]