Google Releases Emergency Update Patching Exploited Bugs

An emergency update for Chrome web browser fixing two zero-day vulnerabilities has been released. The vulnerability is tracked as CVE-2021-38000 and CVE-2021-38003 and relates to insufficient validaton of untrusted input in a feature called Intents and inappropriate implentation in V8 JavaScript and WebAssembly engine. This flaw was discovered and reported by Threat Analysis Group (TAG) […]

Google Releases Emergency Update Patching Exploited Bugs Read More »

Microsoft Cautions on TodayZoo Phishing Kit Used in Credential Stealing Attacks

An extensive series of credential phishing campaigns has been discovered and disclosed by Microsoft on Thursday. This campaign is taking advantage of custom phishing kit that stitched together components from at least five different circulated ones with the aim of siphoning user login information. This discovery was first made in December 2020 and dubbed the

Microsoft Cautions on TodayZoo Phishing Kit Used in Credential Stealing Attacks Read More »

Afghanistan and India are the new Targets of Hacker Group with Commodity RATs

A hacker group is now targeting Afghanistan and India as they exploit a now-patched, 20-year-old flaw affecting Microsoft Office to deploy remote access trojans (RATs) that allow the adversary gain complete control over the compromised endpoints. This has been attributed to a “lone wolf” threat actor operating a Lahore-based fake IT company called Bunse Technologies

Afghanistan and India are the new Targets of Hacker Group with Commodity RATs Read More »

OSINT: All You Need To Know

OSINT is intelligence “drawn from publicly available material”, according to the CIA. Most intelligence experts extend that definition to mean information intended for public consumption. The CIA says that OSINT includes information gathered from the internet, mass media, specialist journals and research, photos, and geospatial information. Most of these sources were used in the Bellingcat

OSINT: All You Need To Know Read More »

Hackers are Hijacking Youtube Accounts with Stolen Browser Cookies

Since late 2019, hackers have taken to hijacking channels of Youtube creators, luring them with bogus collaboration opportunities and eventually using their accounts to broadcast cryptocurrency scams or sell the accounts to the highest bidder. A new report by Google’s Threat Analysis Group (TAG) has stated that it disrupted financially motivated phishing campaigns targeting the

Hackers are Hijacking Youtube Accounts with Stolen Browser Cookies Read More »

U.S. Government Bans Sale of Hacking Softwares To Certain Countries

In a bid to oppose the misuse of technology to abuse human rights or conduct malicious cyber activities, the U.S. Commerce Department on Wednesday announced that it would hence forth bar the sales of hacking software and equipment to authoritarian regimes. This rule will go into effect in 90 days and will forbid the export,

U.S. Government Bans Sale of Hacking Softwares To Certain Countries Read More »

Squirrel Engine Bug Vulnerability Could Let Attackers Break Out Of Sandbox Restrictions

An out-of-bounds read vulnerability in the Squirrel programming language has been discovered by researchers on August 20,2021. This can be abused by attackers to break out of the sandbox restrictions and execute arbitrary code within a SquirrelVM giving a malicious actor complete access to the underlying machine. Tracked as CVE-2021-41556, occurs when a game library

Squirrel Engine Bug Vulnerability Could Let Attackers Break Out Of Sandbox Restrictions Read More »

FlawedGrace New Variant Is Spreading Through Mass Email Campaigns

Cybersecurity researchers have on Tuesday discovered a mass volume of email attack notably targeting Germany and Australia. This campaign has beeen tied to the TA505 which is the name assigned to the financially motivated threat group that’s been in active cybercrime business since at least 2014 and is behind the infamous Dridex anking trojan as

FlawedGrace New Variant Is Spreading Through Mass Email Campaigns Read More »