Skip to main content

Posts

Recent Cyber News

Debit and credit card details along with phone numbers of 70 lakh Indians leaked on dark web

A cybersecurity researcher has claimed that the credit and debit card details, email addresses, phone numbers of 70 lakh Indians have been leaked on the dark web . The credit and debit card details of 70 lakh Indians have been leaked on the dark web. As per a cybersecurity researcher, the sensitive data of Indian users that have been leaked include cardholders' names, phone numbers, income details, account details, and more. The data that has been exposed carries users’ information from 2010 to 2019. As per cybersecurity researcher Rajshekhar Rajahria, the 2GB database on a Google Drive link consists of the names of credit, debit cardholders, phone numbers of the users, email addresses, the name of the employers of the users, annual income. It also consists of information about users’ mobile alerts and their PAN Card details. "Data pertains to the period between 2010 and 2019, which could be very valuable to scammers and hackers. Since this is financial data, it is very valuab
Recent posts

Facebook's Libra Crypto Gets Ready to Launch in January as a Single Coin

Facebook’s libra cryptocurrency is reportedly preparing to launch with a single cryptocurrency, a scaled-down version of its original plan. The launch date for Facebook’s libra could be as early as January. Launch Date for Facebook’s Libra The cryptocurrency libra, proposed by social media giant Facebook, is reportedly preparing to launch as early as January next year. However, only a limited version of the libra cryptocurrency will launch at that time. According to the revised libra whitepaper, the Libra Association intended to initially launch with some of the currencies in the proposed libra basket, such as “librausd or ≋USD, libraeur or ≋EUR, libragbp or ≋GBP, librasgd or ≋SGD),” the association explained. However, the Financial Times reported Friday: The association would now initially just launch a single coin backed one-for-one by the dollar … The other currencies and the composite would be rolled out at a later point. The exact launch date for the libra crypto would depend on w

Malware Operators Arrested for Running Services To Bypass Antivirus Software

Romanian police forces have arrested two individuals this week, for allegedly running two malware crypting services like CyberSeal and DataProtector to escape antivirus software detection. These services were purchased by quite 1560 criminals and used for crypting several different types of malware, including Remote Access Trojans, Information stealers, and Ransomware. The pair used the Cyberscan service also which allowed their clients to test their malware against antivirus tools. How do Criminals Bypass Antivirus Software? Generally, hackers bypass antivirus detection through the utilization of crypters that encrypt or hide the primary code in a piece of software, usually malware to pretend to be something harmless until it gets installed on the victim’s device. In this case, the services provided by these two suspects fall into a similar category and are offered for sale in the underground criminal market since 2010. Their clients paid between US$40 to US$300 for these crypting ser

Google Task Mate 100% Working Invitation Referral Code – Activate Task Mate Account (Easy Steps)

  Valid and 100% Working Referral Code for Google Task Mate (Beta) Early Access/ Testers : Google India has Launched Task Mate App on 19 November 2020 for the Indian user where you can Earn Money by finding task nearby, complete task i.e. Photo Upload, Record Sentence, Translate Sentences, Check shop details, upload video, etc. As the Task Mate is available to users in Beta Early Access only and for that, you have to enter a valid Invitation Referral Code. Here, Our Website Group (WhatsApp, Telegram and Twitter) Group and Channel are providing valid Referral Codes. Task Mate Beta is currently only available through invitation. Please enter the invitation or referral code below. TaskMate App – Complete Task to Earn Money Article About Valid Invitation Code of Task Mate (Referral Code) Company Google India App Task Mate (Early Access) Version Beta (Early Access) Invitation/ Referral Code Required Validity of Code Only for 100 Users per Invitation Code Website http://www.google.com/ Very

GitHub Launches Code Scanning Tool to Find Security Vulnerabilities – Available for All Users

GitHub launches a new code scanning tool that helps developers to detect vulnerability before the application reaches production. The tool was announced initially in May at the GitHub Satellite conference, since that time it is available for GitHub beta testers. GitHub Code Scanning Tool Now the GitHub code scanning tool is  available  for all users and they can enable it to form a public repository. The new tool is the result of the acquisition of Semmle last year. Semmle is a code analysis platform that helps developers to write queries that identify code patterns in large codebases and search for vulnerabilities and their variants. GitHub said they “worked to bring the revolutionary code analysis capabilities of its  CodeQL  technology to GitHub users as a native capability.” Code scanning tool powered by powerful code analysis engine CodeQL technology to GitHub users as a native capability. The tool gets integrated with GitHub Actions—or your existing CI/CD environment—to maximize

Microsoft’s Windows XP operating system (and other versions) source code has been leaked online

  The source code for Microsoft’s Windows XP operating system (and other versions) has been leaked online!  Published as a torrent file on bulletin board website 4chan, the 43GB data dump is said to have been compiled over the course of the last few months by the leaker. The collection also includes source code for Windows 2000 and multiple versions of Windows CE, MS DOS, Windows Embedded and Windows NT - but all of which have a smaller modern install base than XP. The individual responsible for the leak also appears to bear Bill Gates a distinct grudge, dedicating a whole section of the torrent file to videos slandering the Microsoft founder.  The legitimacy of the leaked code has not yet been confirmed, but Microsoft has been made aware of the issue. Although support for Windows XP lapsed in 2014 - meaning the OS has not received security updates for a number of years - a surprising number of users remain loyal to the outdated operating system. As of last month, 1.26% of all laptops

Google rolls out new automated threat detection tool

Google and its subsidiary Chronicle are rolling out new automated threat detection capabilities for its Google Cloud platform to help companies scale up security monitoring for their legacy systems. The product – called Chronicle Detect – has been in the works for some time and Google unveiled some details around certain components earlier this year at RSA, like a data fusion model to create timelines, a rules engine for common events and incorporated YARA malware threat behavior language. Often, log data or telemetry from a company’s older, off-the-shelf or internal applications aren’t set up to integrate with or port to modern threat detection and response platforms. That can make consistent, continuous security monitoring harder and create visibility gaps for huge chunks of enterprise. In a release, Sunil Potti, Google’s general manager and vice president of engineering, and Rick Caccia, head of marketing for Google’s Cloud Security team, said the new capabilities were designed to a