Tag

Information Security

Zoom Security Issues: Privilege Escalation Vulnerabilities in Desktop and Mobile Apps
Cyber Security
Zoom Security Issues: Privilege Escalation Vulnerabilities in Desktop and Mobile Apps

Zoom has gained immense popularity as a video conferencing software, especially during the COVID-19 pandemic. However, recent security concerns have surfaced regarding vulnerabilities in Zoom’s desktop and mobile apps. In this article, we will delve into the various privilege escalation vulnerabilities that have been identified and their potential impact on user security. Privilege Escalation Vulnerability Privilege escalation refers to an

Read More
New Threat Actor Targets APAC Organizations Using SQL Injection Attacks
Cyber Security
New Threat Actor Targets APAC Organizations Using SQL Injection Attacks

A new and concerning threat actor has recently emerged, utilizing SQL injection attacks to gain unauthorized access to organizations operating in the APAC region. This article aims to provide a comprehensive overview of their activities, including the targeted websites, successful infiltrations, tools employed, language-based commands, remote file loading techniques, hosting with Supershell, modifications with Cobalt Strike, IP addresses used, and

Read More
Revolutionizing Wallet Experience: An In-Depth Analysis of Core Wallet’s Seed Abstraction Feature
Fintech Blockchain
Revolutionizing Wallet Experience: An In-Depth Analysis of Core Wallet’s Seed Abstraction Feature

Blockchain technology has revolutionized various industries by offering new possibilities for decentralized and secure transactions. As the adoption of blockchain continues to grow, it is essential to make blockchain products as user-friendly and accessible as their Web2 counterparts. Core Wallet has introduced an innovative approach to wallet creation with its Seed Abstraction feature, eliminating the need for cumbersome seed phrases.

Read More
Cyberattack Disrupts Operations at Newsquest, UK’s Largest Regional Media Group
Cyber Security
Cyberattack Disrupts Operations at Newsquest, UK’s Largest Regional Media Group

Newsquest, one of the UK’s largest regional media groups, recently fell victim to a sophisticated cyber attack that has disrupted operations at its local news outlets. The attack, which occurred on December 11th, has caused intermittent website outages and left journalists unable to file stories. The incident has been reported to the UK National Cyber Security Centre, underscoring the seriousness

Read More
The Game-Changing Potential of AI-Powered Cryptocurrencies in Secure Digital Transactions
Robotic Process Automation In Fintech
The Game-Changing Potential of AI-Powered Cryptocurrencies in Secure Digital Transactions

In a rapidly evolving digital landscape, AI-powered cryptocurrencies have emerged as trailblazers, introducing an advanced layer of security to the realm of digital transactions. By harnessing the power of machine learning algorithms, these cryptocurrencies offer enhanced security features and streamlined processes that outperform their non-AI counterparts. This article explores the potential of AI-powered cryptocurrencies to revolutionize the world of finance,

Read More
Embracing the Digital Age: A Comprehensive Guide to Cloud-Native Security Automation
Cloud
Embracing the Digital Age: A Comprehensive Guide to Cloud-Native Security Automation

As organizations increasingly rely on cloud-native environments, the need to prioritize and strengthen cybersecurity becomes paramount. Traditional security practices are no longer sufficient to defend against evolving threats. This article explores the importance of cloud-native security automation and how it can significantly bolster an organization’s security posture. We will delve into the benefits of this approach, discuss tools for effective

Read More
Blockchain in Defense: Revolutionizing Supply Chain Management and National Security
DevOps
Blockchain in Defense: Revolutionizing Supply Chain Management and National Security

Today, secure defense supply chain management plays a critical role in ensuring the safety and resilience of military operations. However, the complexities and vulnerabilities inherent in these supply chains call for innovative solutions. This is where blockchain integration emerges as a disruptive technology with the potential to transform the defense industry. With its decentralized nature, immutability, and trust-based framework, blockchain

Read More
Revamping Traditional Banking: Perspectives on Blockchain and DLT Integration from Deutsche Bank’s Digital Transformation Head
DevOps
Revamping Traditional Banking: Perspectives on Blockchain and DLT Integration from Deutsche Bank’s Digital Transformation Head

In recent years, blockchain and distributed ledger technology (DLT) have emerged as groundbreaking innovations with the potential to transform the traditional banking industry. This article delves into the significance of these technologies, the challenges faced by the current banking infrastructure, the meticulous process of upgrading technology, and the numerous benefits that blockchain offers to enhance the overall efficiency, security, and

Read More
Android Loan Apps Exposed: SpyLoan Malware Targets Unsuspecting Users
Cyber Security
Android Loan Apps Exposed: SpyLoan Malware Targets Unsuspecting Users

The proliferation of smartphones and mobile apps has revolutionized the way we live and conduct financial transactions. However, with the convenience comes a dark side – the rise of malicious apps designed to deceive and exploit unsuspecting users. In recent weeks, reports have emerged highlighting the presence of several Android loan apps that masquerade as legitimate services but are, in

Read More
GambleForce: Unveiling a Prolific Hacker Group Exploiting SQL Injections
Cyber Security
GambleForce: Unveiling a Prolific Hacker Group Exploiting SQL Injections

In recent months, a previously unknown hacker group named GambleForce has emerged as a significant cybersecurity threat, conducting a series of SQL injection attacks primarily targeting companies in the Asia-Pacific (APAC) region. This article sheds light on the tactics, targets, and vulnerabilities exploited by GambleForce, emphasizing the importance of proactively addressing SQL injection risks to protect web applications. Targets and

Read More
Critical Remote Code Execution Vulnerability in Apache Struts 2 Framework: Urgent Patching Required to Mitigate Risk
Cyber Security
Critical Remote Code Execution Vulnerability in Apache Struts 2 Framework: Urgent Patching Required to Mitigate Risk

The Apache Software Foundation has issued a warning to its users regarding a critical remote code execution (RCE) vulnerability discovered in its widely used Struts 2 framework. This vulnerability, designated as CVE-2023-50164, has been classified with the highest severity rating and affects multiple versions of Struts. In this article, we will delve into the specifics of this vulnerability and emphasize

Read More
Exploitation of OAuth Applications: A Growing Threat to User Accounts and Organizations
Cyber Security
Exploitation of OAuth Applications: A Growing Threat to User Accounts and Organizations

With the rise of OAuth applications, a new avenue for hackers to compromise user accounts and gain unauthorized access has emerged. These applications, designed to enhance user experience and simplify authentication processes, are now being exploited by cyber threat actors. In this article, we will delve into how hackers are leveraging OAuth vulnerabilities to manipulate privileges, execute crypto mining operations,

Read More