Latest Security News

Thousands Of Apps In The Play Store Are Trojan Horses

Note: This is a follow-up article of our story regarding Google Play Store that was published earlier. The Data61 team from the University of Sydney and Commonwealth Scientific and Industrial Research Organization (CSIRO) has revealed that Google Play is riddled with malicious cloned apps of the top 10,000 apps. According to Data61 team, they were

[ Read More ]

Vulnerability Management In The Nutshell

In the process of developing and actually using particular software, security vulnerabilities leading to cyber attacks are commonplace. It is a well-known fact that there are a series of cyber-attacks that are perpetuated by malicious people, we report various incidents of cyber attacks and online misbehavior of some parties, to gain an upper hand in

[ Read More ]

Zero-day WordPress Plugin Exploits Irresponsibly Disclosed

WordPress is once again in the headlines of Tech News, as two zero-day exploits have been discovered, both related to how WordPress interacts with Facebook. The first one is Facebook for WooCommerce, is a WordPress plugin which promises to provide an interface between WooCommerce and Facebook. The second plugin is Messenger Customer Chat, as the

[ Read More ]

26-Exploits Loaded To Echobot Botnet, A Big Threat

The computing public is being made aware of an emerging botnet that is currently growing in the wild named Echobot. Considered by Palo Alto Network as the spiritual successor of Mirai botnet, Echobot now comes with an arsenal of 26 exploits designed to take over Internet-connected devices, now including a module to infect IoT and

[ Read More ]

Machine Learning With Threat Analytics Helps Stop Security Breaches

It is time to bring in some clarity about the gravity of the crimes that are happening today around the world. A common misconception or fiction is that millions of hackers have turned to the dark side and are organizing massive attacks against any vulnerable company. The facts reflect a much more brutal truth that

[ Read More ]

A First Look At Hacking Campaign Vs Exim Servers

The Internet, including both the surface web and the Dark Web is currently being scanned by cybercriminals looking for vulnerable Exim servers, which currently has 57% market share of all existing email servers in the world. The Exim email server flaw documented under CVE-2019-10149 enables hackers to send malformed emails to a target Exim server

[ Read More ]

5 Features Of Android To Aid Pen Testing

We are living in a different world now compared to 10 years ago. Before, the most important thing for a developer to reach is a working-state for his/her application. The program needs to run without crashing, regardless of what video card, amount of memory, processor clock speed and the storage used in the computer where

[ Read More ]

FBI Warns Against TLS-based Phishing Websites

Here in thethreatreport.com, we always emphasize to our readers to always check the address bar of your browser for the “closed padlock” icon before logging-in to your web service accounts, whatever it maybe. The encryption protocol used is practically speaking still unbreakable even with today’s binary supercomputers. However, the age-old yet pretty effective security advice

[ Read More ]

Binding Link Between Cyber Warfare and IT Security

Strong territorial defense alone is not enough to combat today’s risks, as the Internet created another space for people to operate and to move beyond the physical world. Individuals, private companies and the public sector need to maintain a defensive posture when it comes to watching over their network boundaries. Companies, governments and everyone using

[ Read More ]

Apple Services, Is This The Future Of Cupertino?

At the wake of the Huawei ban, which places the second largest smartphone manufacturer with a questionable future, Apple, the former second largest smartphone manufacturer is set to host its World Wide Developer Conference 2019. Through the WWDC, Apple provides the overall direction of their products and services, their relationship with the development community and

[ Read More ]