Twitter’s new hacking label has already been hacked

Twitter has started to label some tweets with a warning about materials “obtained through hacking.” This new label is appearing on some news stories that Twitter believes are based on hacks and leaked documents, but Twitter users have found an easy way to hack a URL together to make it appear on any tweet. The new label appeared on a story from independent outlet The Grayzone this week. If you share the URL of this particular story, it will generate the warning. But Twitter also displays the warning if you…

Read More

How RootKits Works & How To Detect Rootkits?

How RootKits Works & How To Detect Rootkits? – System hooking is a process of changing and replacing the original function pointer with the pointer provided by the rootkit in stealth mode. Inline function hooking is a technique where a rootkit changes some of the bytes of a function inside the core system DLLs (kernel32.dll and ntdll.dll) placing an instruction so that any process calls hit the rootkit first. Direct Kernel Object Manipulation (DKOM) rootkits are able to locate and manipulate the “system” process in kernel memory structures and patch…

Read More

First Malware Designed for Apple M1 Chip Discovered in the Wild

One of the first malware samples tailored to run natively on Apple’s M1 chips has been discovered, suggesting a new development that indicates that bad actors have begun adapting malicious software to target the company’s latest generation of Macs powered by its own processors. While the transition to Apple silicon has necessitated developers to build new versions of their apps to ensure better performance and compatibility, malware authors are now undertaking similar steps to build malware that are capable of executing natively on Apple’s new M1 systems, according to macOS…

Read More

Privacy Bug in Brave Browser Exposes Dark-Web Browsing History of Its Users

Brave has fixed a privacy issue in its browser that sent queries for .onion domains to public internet DNS resolvers rather than routing them through Tor nodes, thus exposing users’ visits to dark web websites. The bug was addressed in a hotfix release (V1.20.108) made available yesterday. Brave ships with a built-in feature called “Private Window with Tor” that integrates the Tor anonymity network into the browser, allowing users to access .onion websites, which are hosted on the darknet, without revealing the IP address information to internet service providers (ISPs),…

Read More

What is RootKits?

What is RootKits? – Rootkits are software programs aimed to gain access to a computer without detection. These are malware that help the attackers to gain unauthorized acess to a remote system and perform malicious activities. The goal of the rootkit is to gain root privileges to a system. By logging in as the root user of a system, an attacker can perform any task such as installing software or deleting files, and so on. It works by exploiting the vulnerabilities in the operating system and applications. It builds a…

Read More

Top 5 Best Vulnerability Scanning Tools

Top 5 Best Vulnerability Scanning Tools – An attacker performs vulnerability scanning in order to identify security loopholes in the target network that he/she can exloit to launch attacks. Security analysts can use vulnerability scanning tools to identify weaknesses present in the organization’s security posture and remediate the identified vulnerabilities before an attacker exploits. Network Vulnerability Scanners help in analyzing and identifying vulnerabilities in the target network or network resources by means of vulnerability scanning and network auditing. These tools also assist in overcoming weaknesses in the network by suggesting…

Read More

Vulnerability Scoring System

Vulnerability Scoring System – Vulnerability scoring systems and vulnerability databases are used by security analysts to rank information system vulnerabilities, and to provide a composite score of the overall severity and risk associated with identified vulnerabilities. Vulnerability databases collect and maintain information about various vulneabilities present in the information systems. This section discusses Common Vulnerability Scoring System (CVSS), and vulnerability databases like Common Vulnerabilities and Exposures (CVE), and National Vulnerability Databases (NVD). Vulnerability Scoring System Common Vulnerability Scoring System (CVSS) Source : First Org CVSS is a published standard that…

Read More

Working of Vulnerability Scanning?

Working of Vulnerability Scanning? – Any organization needs to handle and process large volumes of data in order to carry out business. These large volumes of data contain the information of that particular organization for which access is denied to the unauthorized users. Attackers try to find certain vulnerabilities that they can exploit and use those to gain access to the critical data for illegal purposes. Vulnerability analysis performs a study on the risk-prone area of the organizational network. This analysis is done various tools. the vulnerabilitiy analysis reports on…

Read More

What is Vulnerability Assessment?

What is Vulnerability Assessment? – Vulnerability Assessment is an examination of the ability of a system or application, including current security procedures and controls, to withstand assault. Vulnerability scans networks for known security weaknesses. it recognizes, measures, and classifies security vulnerabilities in a computer system, network, and communication channels. It also assists security professionals in securing the network by determining security loopholes or vulnerabilities in the current security mechanism before the bad guys can exploit them. A vulnerability assessment may be used to: Identify weaknesses that could be exploited Predict…

Read More

Classification of Vulnerability?

Classification of Vulnerability? – In a network there are generally two main causes for systems being vulnerable, software or hardware misconfiguration and poor programming practices. Attackers exploit these vulnerabilities to perform various types of attacks on organizational resource. Classification of Vulnerability? Vulnerability present in a system or network are classified into the following categories: Misconfiguration Misconfiguration is the most common vulnerability that is mainly caused by human error, which allows attackers to gain unauthorized access to the system. This may happen intentionally or unintentionally affecting web servers, application platform, database…

Read More