Skip to main content

Posts

Showing posts from April, 2020

Web Application Attacks , types and preventions.

With this text , we list a number of the common web application attacks, impacts, and possible mitigation. partially -1 we are covering the subsequent attacks.  Local File Inclusion  Malicious File Upload  Clear Text Traffic  Http parameter pollution attack  Link Injection  Session ID without session attribute  Auto-Complete Attribute Not Set to Off Local File Inclusion Local File Inclusion is that the process of including files on a server through the online browser. This vulnerability occurs when a page include isn't properly sanitized and allows directory traversal characters to be injected. Impact  An attacker can gain access to the server and launch further attacks to compromise the service. Mitigation It is recommended to filter metacharacters from user input. make sure that the newest version of the webserver is installed and every one patches are applied. Malicious File Upload when the appliance has...

IT Services Giant Cognizant Hit by Maze Ransomware Cyber Attack

IT Services Giant Cognizant Hit by Maze Ransomware Cyber Attack Cognizant Technology Solutions Corp, one among the most important IT services providers hit by Maze Ransomware Cyber Attack which causes service disruptions to its clients. The company has quite 300,000 employees and it provides IT services, including digital, technology, consulting, and operations services. Maze Ransomware Attack – Cognizant The company started emailing their client on Friday, stating that their internal systems hit by Maze ransomware attack. “Cognizant can confirm that a security incident involving our internal systems, and causing service disruptions for a few of our clients, is that the results of a Maze ransomware attack,” reads the corporate statement.  High alert associated with the yet one more ransomware attack perpetrated by the Maze group possibly affecting @Cognizant.  Reviewing & mitigating against the standard Maze TTPs (including RDP + remote services...

Best Free Antivirus Download For PC 2020

Basically, a Best Free Antivirus software is that the most essential a part of Windows and significant for each Windows PC nowadays since the cyber threat is continuously evolving day by day. As without an Antivirus, you've got a risk of losing your personal information, like your files, the cash from your checking account , ransom, and far more. From the above topic, you would possibly have guessed that today we are discussing the simplest free antivirus software 2020 for windows. So, let’s know first what antivirus is, why it's so essential and what its functions. Thus we've picked the highest 10 best antivirus protection tools for your computer. As we all know alright that each Windows system requires the simplest Free antivirus software, still if it’s free. Thus the Windows Defender security software is usually developed by Microsoft that comes pre-installed with Windows 10 and therefore the most interesting thing about this security tool is, it'...

Nmap - Network Mapper

   Introduction Of Nmap Nmap is released under a custom license, which is based on (but not compatible with) GPLv2. The Nmap license allows free usage by end users, and we also offer a commercial license for companies that wish to redistribute Nmap technology with their products. See Nmap Copyright and Licensing for full details. The latest version of this software as well as binary installers for Windows, macOS, and Linux (RPM) are available from Nmap.org Full documentation is also available on the Nmap.org website . Questions and suggestions may be sent to the Nmap-dev mailing list . How To Install (Already Present In Kali Linux Operating System)  Ideally, you should be able to just type: ./configure make make install      Use Of Nmap  Nmap is a powerful tool for discovering information about machines on a network or the Internet. It allows you to probe a machine with packets to detect everything from running...

One Plus 8 Details

     Buy For Punch-hole display Excellent camera Good battery capacity Wireless charging support Efficient performance Beware of Non-expandable storage Verdict OnePlus 8 is a beautiful handset that comes with sturdy features. The display has a punch-hole design and delivers an excellent viewing experience. As with any other OnePlus smartphones, the camera of this device is also up to the mark using which anyone can capture excellent landscape. To offer long-time power supply, there is a massive battery that features both fast charging and wireless charging features. The internal storage is massive but there is no option to expand. Power and performance.   Display and Camera OnePlus 8 flaunts a punch-hole screen, which stands 6.5-inch tall. The Fluid AMOLED display offers excellent viewing experience along with 1,080 x 2,340 pixels screen resolution and 396 PPI pixel density. It is also protected wit...

Hackers Are Selling Windows Zoom Zero-Day Exploit for $500,000

Earlier this month multiple vulnerabilities discovered with Zoom’s Windows and macOS clients, those vulnerabilities allow attackers to escalate privileges with macOS and to steal login credentials with windows. Following that various sources confirmed that attackers selling Zoom login credentials, meeting IDs, names and host keys in the hacking forums. Zoom Zero-Day Exploit for $500,000 Motherboard reported that now hackers started selling zero-day exploits on the dark web forums, by exploiting the vulnerability attackers can hack and spy users. Adriel Desautels, founder of Netragard said that “From what I’ve heard, there are two zero-day exploits in circulation for Zoom One affects OS X and the other Windows”. Multiple anonymous sources confirmed the existence of the exploits on the hacker’s forums, the exploit code was not yet analyzed, but the brokers offering sales has been contacted. The zero-day for the Zoom Windows app is advertised f...

New Version of Anonymous Operating System Tails 4.5 Released with Fix for Security Flaws

Tails is a security-focused Debian based live operating system, no installation required. You can use the live operating system on any computer from a USB stick or a DVD. The operating system aimed to provide privacy and anonymity, all its communications are forced through the TOR network. It leaves no traces on the computer and it uses State-of-the-art cryptographic tools to encrypt your files, emails and instant messaging. New Version Tails 4.5 The Tails 4.5 was released with a security feature Secure Boot, it is designed to protect the system against malicious code execution in the boot process. While booting, every time the UEFI firmware inspects the binary for valid signature, invalid binary is loaded while the secure boot is enabled, the user is alerted, and the system will refuse to boot. The new version of Talis also includes fix for several security bugs, it also includes fix several Firefox vulnerabilities targeted by the attackers in the wi...

TikTok Vulnerability Allows Uploading of Fake Videos To User Accounts

A security vulnerability with TikTok allows attackers to inject any videos in the User feeds, the bug affects verified users also. Attackers may exploit this vulnerability to ake their videos popular. TikTok is a Chinese based popular video-sharing mobile platform and which is owned by Beijing-based ByteDance.It is the most popular video-sharing app, it has more than 1.3 billion users worldwide. TikTok Vulnerability TikTok app uses insecure HTTP to process the data transfer, according to the analysis by researchers Talal Haj Bakry and Tommy Mysk the videos and images transferred are unencrypted. An attacker between the “TikTok app and TikTok’s CDNs can easily list all the videos that a user has downloaded and watched, exposing their watch history.” Wireshark Analysis     By launching a man-in-the-middle attacker can download the content and modify it, aiming to provide the fake facts in a spam video instead of the original one posted. ...

What Is Cyber Security

    What Is Cyber Security Also referred to as information security, cybersecurity refers to the practice of ensuring the integrity, confidentiality, and availability (ICA) of information. Cybersecurity is comprised of an evolving set of tools, risk management approaches, technologies, training, and best practices designed to protect networks, devices, programs, and data from attacks or unauthorized access. Secure your network with NGFW Why is cybersecurity important? The world relies on technology more than ever before. As a result, digital data creation has surged. Today, businesses and governments store a great deal of that data on computers and transmit it across networks to other computers. Devices and their underlying systems have vulnerabilities that, when exploited, undermine the health and objectives of an organization. A data breach can have a range of devastating consequences for any business. It can...

Most Popular Penetration Testing Tools Found in Kali Linux

Most Popular Penetration Testing Tools Found in Kali Linux Attribution link: https://latesthackingnews.com/2020/01/27/5-of-the-most-popular-penetration-testing-tools-found-in-kali-linux Most Popular Penetration Testing Tools Found in Kali Linux Attribution link: https://latesthackingnews.com/2020/01/27/5-of-the-most-popular-penetration-testing-tools-found-in-kali-linux/ Most Popular Penetration Testing Tools Found in Kali Linux  Nmap  Nmap, short for Network Mapper, is a free, open-source tool for vulnerability scanning and network discovery. Network administrators use Nmap to identify what devices are running on their systems, discovering hosts that are available and the services they offer, finding open ports and detecting security risks . Nmap can be used to monitor single hosts as well as vast networks that encompass hundreds of thousands of devices and multitudes of subnets.Though Nmap has evolved over the years and is extremely flexible, ...

Basic linux commands

Linux Commands Basic Commands 1. pwd — When you first open the terminal, you are in the home directory of your user. To know which directory you are in, you can use the “pwd” command. It gives us the absolute path, which means the path that starts from the root. The root is the base of the Linux file system. It is denoted by a forward slash( / ). The user directory is usually something like "/home/username". 2. ls  — Use the "ls" command to know what files are in the directory you are in. You can see all the hidden files by using the command “ls -a” . 3. cd — Use the "cd" command to go to a directory. For example, if you are in the home folder, and you want to go to the downloads folder, then you can type in “cd Downloads” . Remember, this command is case sensitive, and you have to type in the name of the folder exactly as it is. But there is a problem with these commands. Imagine you have a folde...