Category: GBHackers On Security

Wireless Penetration Testing Checklist – A Detailed Cheat Sheet

Read the original article: Wireless Penetration Testing Checklist – A Detailed Cheat Sheet Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses the Weakness, technical flows, and Critical wireless…

Over 20 Million BigBasket Customers Data Exposed in DarkWeb

Read the original article: Over 20 Million BigBasket Customers Data Exposed in DarkWeb BigBasket(Innovative Retail Concepts Private Limited) is India’s largest online food and grocery store. It is funded by Alibaba Group, Mirae Asset-Naver Asia Growth Fund, and therefore the UK…

Cisco AnyConnect VPN zero-day Vulnerability, Exploit Code Available

Read the original article: Cisco AnyConnect VPN zero-day Vulnerability, Exploit Code Available Cisco, the California based tech giant, has identified and disclosed a vulnerability via advisory CVE-2020-3556, regarding the InterProcess Communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software…

Fake COVID-19 Test Results Drop King Engine Ransomware

Read the original article: Fake COVID-19 Test Results Drop King Engine Ransomware According to Cofense Intelligence researchers, a new version of Hentai OniChan Ransomware dubbed “King Engine” is being delivered during a Coronavirus-themed phishing campaign. The new variant called King…

Infamous Maze Ransomware Operators Shuts Down Operations

Read the original article: Infamous Maze Ransomware Operators Shuts Down Operations Maze ransomware, one of the most dangerous and potent strains of Windows ransomware that have hit companies and organizations around the world and demanded a payment in cryptocurrency in…

Firestarter Malware Abuses Google Firebase Cloud Messaging Platform to Spread

Read the original article: Firestarter Malware Abuses Google Firebase Cloud Messaging Platform to Spread The ‘Firestarter’ malware is used by an APT threat group called “DoNot”. DoNot uses Firebase Cloud Messaging (FCM), a cross-platform cloud solution for messages and notifications for Android, iOS, and web applications,…

Vermont Hospitals Now Latest Victim of Ransomware Attacks

Read the original article: Vermont Hospitals Now Latest Victim of Ransomware Attacks The University of Vermont Health Network is now the latest victim in an ongoing onslaught of cyberattacks. The cyberattack has targeted the University’s six hospitals in Vermont and…

VOIP Service Provider Exposes 350M Customer Records

Read the original article: VOIP Service Provider Exposes 350M Customer Records A database of over 350 million customer records exposed from unsecured Elasticsearch cluster belonging to voice over-internet-protocol company Broadvoice. The database was uncovered by security researcher Bob Diachenko, on…

5G Technology and How It Will Change Cybersecurity

Read the original article: 5G Technology and How It Will Change Cybersecurity 5G also called the fifth generation of wireless cellular networks, will offer new opportunities to all walks of life, including health, supply chain, agriculture, etc. Similarly, emerging technologies…

The Importance of Cybersecurity in The Post-COVID-19 World

Read the original article: The Importance of Cybersecurity in The Post-COVID-19 World Many organizations woke up to the importance of cybersecurity when the COVID-19 pandemic struck and shone a harsh light on the state of cybersecurity. The new constellation of…

Zoom Adds Two-factor Authentication Available for all Users

Read the original article: Zoom Adds Two-factor Authentication Available for all Users Zoom announced Two-Factor Authentication (2FA) for all users that let admins and organizations prevent security breaches & data thefts. The 2FA brings an additional security layer to the…

Streamlining Cybersecurity With Immutable Log Files

Read the original article: Streamlining Cybersecurity With Immutable Log Files Although often relegated to the sidelines, the use of log files and the implementation of a strong log management strategy is vital for ensuring the performance and stability of business…

Streamlining cybersecurity with immutable log files

Read the original article: Streamlining cybersecurity with immutable log files Although often relegated to the sidelines, the use of log files and the implementation of a strong log management strategy is vital for ensuring the performance and stability of business…

How to Build and Run a Security Operations Center

Read the original article: How to Build and Run a Security Operations Center Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise. This includes a vast…