web analytics
  • News and Threat Analysis,  Tools, Tricks and More

    ZERO DAY IN MAC OS THAT BYPASS THE PRIVACY OF USER

    As Apple announced macOS 11 Big Sur at WWDC 2020, claiming that it will have major improvements as compared to macOS Catalina , a professional MAC and IOS developer reveals a Mac privacy bug . When MacOs Mojave was introduced , Apple claimed that it would provide additional protection for the user’s private data. A privacy protections system (TCC : Transparency ,Consent, Control) was introduced in Mojave to protect the files on our Mac from access by unauthorised applications. A researcher found a way to hinder the private data of users that too with an unauthorised app , thus bypassing the privacy of the users . He claimed that this…

  • News and Threat Analysis

    THANATOSCRYPT IS EXPLOITING BLUEKEEP VULNERABILITY TO MINE CRYPTO FROM YOUR SYSTEMS

    Some days before, Ethical Debuggers presented how Chinese hackers are attacking servers to mine cryptocurrency from them. Today, we are presenting a similar campaign ,which is currently going on ,to mine cryptocurrency from your systems . It was found by Tencent Security Intelligence Team. This time the hackers used a simple phenomenon to attack on your systems. They used a Bluekeep vulnerability which was discovered in early May, an year ago. It was a vulnerability in Microsoft’s Desktop Protocol and allows attacker to execute arbitrary code post exploitation. This vulnerability was regarded as one of the high-risk vulnerability and can be tracked via CVE-2019-0708. On 6 September 2019, Metasploit launched…

  • News and Threat Analysis

    FACEBOOK, AMD, NVIDIA AND ACCENTURE WILL NOW FOCUS ON CONFIDENTIALITY OF THEIR CUSTOMER’S DATA

    Recently, there were many controversies on Facebook, Whatsapp, Google related to data security in the market. These all big giants even claimed that they follow end to end encryption policy which basically runs under an algorithm of asymmetric cryptography. To prove that they are committed to our security, some of them signed the Confidential Computing Consortium. Last year, Google along with Microsoft including 8 other companies(Intel, Microsoft, IBM, Intel, Alibaba, ARM, Red Hat, Swisscom and Tencent) signed this consortium. We believe that while data is transmit across the internet, CIA rule- Confidentiality, Integration and Authentication is being followed . To maintain all these factors, companies need to invest millions of…

  • News and Threat Analysis

    THIS RATKing WILL EAT UP YOUR PRIVACY

    RATKing is an animal which consists of a collection of rats with entwined tails . Some researchers found a new group that attacks the victims with a variety of trojans and thus named as RATKing .This group was in consideration by the researchers from late may . Let’s analyse the anatomy of this attack. ANATOMY OF THE ATTACK The attacker uses a simple phenomena of phishing to attack its victim. The attacker first sends an email to it’s victim that convinces them to download a file that is pertaining to be a PDF file but it is a VBScript that is used as a first process in the generation of…

  • News and Threat Analysis

    DARK CREW FRIENDS ARE ATTACKING THE SITES USING CMS. HOW IS YOUR SITE DEVELOPED?

    In this worldwide lockdown, many people have launched their own website to entertain people. Many of them tried a Content Management System like WordPress to create their site. The simple reason behind this is that CMS(Content Management System) automates task, saves time and money as well. But what about security and privacy of our website? Many users think that setting up a web application firewall can prevent their site from all the attacks, but Beware! Hackers are smarter than us . They don’t waste their time where we have already taken precautions instead they attack on that vulnerability which we are unaware about. Some researchers from Checkpoint have explored the…