Technology

PgMiner botnet attacks weakly secured PostgreSQL databases

PgMiner botnet attacks weakly secured PostgreSQL databases

Security researchers have discovered this week a botnet operation that targets PostgreSQL databases to install a cryptocurrency miner. Codenamed by researchers as PgMiner, the botnet is just the latest in a long list of recent cybercrime operations that target web-tech for monetary profits. According to researchers at Palo Alto Networks' Unit 42, the botnet operates by performing brute-force attacks against internet-accessible PostgreSQL databases. The attacks follow a simple pattern. The botnet randomly picks a public network range (e.g., 18.xxx.xxx.xxx) and then iterates through all IP addresses part of that range, searching for systems that have the PostgreSQL port (port 5432) exposed…
Read More
Microsoft exposes Adrozek, a malware that hijacks Chrome, Edge, and Firefox

Microsoft exposes Adrozek, a malware that hijacks Chrome, Edge, and Firefox

Microsoft has raised the alarm today about a new malware strain that infects users' devices and then proceeds to modify browsers and their settings in order to inject ads into search results pages. Widespread malware campaign seeks to silently inject ads into search results, affects multiple browsers - Microsoft 365 Defender Research Team Named Adrozek, the malware has been active since at least May 2020 and reached its absolute peak in August this year when it controlled more than 30,000 browsers each day. Such a sustained, far-reaching campaign requires an expansive, dynamic attacker infrastructure. We tracked 159 unique domains, each hosting…
Read More
AWS hires Rust compiler team co-lead Felix Klock

AWS hires Rust compiler team co-lead Felix Klock

Cloud giant AWS has a lust for Rust Programming Language so needs top minds and wants them to advance the language. Amazon Web Services has quietly revealed that it has hired Rust compiler co-lead Felix Klock. AWS's Matt Assay wrote that the company "increasingly builds critical infrastructure like the Firecracker VMM using Rust because its out-of-the-box features reduce the time and effort needed to reach Amazon's high security bar, while still delivering runtime performance similar to C and C++." AWS likes Rust so much it sponsored the project and said the company has even "started hiring Rust and Tokio committers…
Read More
Tinfoleak – The most complete Open-source tool for Twitter Intelligence Analysis

Tinfoleak – The most complete Open-source tool for Twitter Intelligence Analysis

tinfoleak is an open-source tool within the OSINT (Open Source Intelligence) and SOCMINT (Social Media Intelligence) disciplines, that automates the extraction of information on Twitter and facilitates subsequent analysis for the generation of intelligence. Taking a user identifier, geographic coordinates or keywords, tinfoleak analyzes the Twitter timeline to extract great volumes of data and show useful and structured information to the intelligence analyst. tinfoleak is included in several Linux Distros: Kali, CAINE, BlackArch and Buscador. It is currently the most comprehensive open-source tool for intelligence analysis on Twitter. tinfoleak can extract the following information: Account info / User Activity / Protected Accounts / User Relations Source Applications / User Devices…
Read More

Hackers are actively probing millions of WordPress sites

As of Nov 22, 2020, Unknown threat actors are scanning for WordPress websites with Epsilon Framework based themes installed on over 150,000 sites and vulnerable to Function Injection attacks that could lead to full site takeovers. "So far today, we have seen a surge of more than 7.5 million attacks against more than 1.5 million sites targeting these vulnerabilities, coming from over 18,000 IP addresses," Wordfence QA engineer and threat analyst Ram Gall said. The ongoing large-scale wave of attacks against potentially vulnerable WordPress websites is targeting recently patched vulnerabilities. While the security flaws found during the last few months in themes using…
Read More

Shortcut Virus – How to Remove it

Pen Drive, SD Cards or USB Flash drives are common devices to transfer data from one computer to another. Sometimes we get errors while connecting Pen drive to Computer and during data transfer one of them is Shortcut Error, basically, this is a Virus known as Shortcut Virus, it converts every file into shortcut in Pen drive / Hard drive / USB Drive. In this article, we will guide you, how to remove shortcut virus from your flash drive as well as computer. What is Shortcut Virus and How does it Works? When we connect a removable drive to a malware affected…
Read More
App Store Optimization Checklist – ASO Tips

App Store Optimization Checklist – ASO Tips

App Store Optimization is a way of ensuring your app meets app store ranking criteria and rises to the top of a search results page. But how does a marketer optimize for better discover-ability in an app store? To help you boost your app marketing strategy and app store ranking, We have put together a list of 10 best App Store Optimization tips. 1. Understand your customer and your competition How well do you know your customers and your competition? A well-formed App Store Optimization (ASO) strategy hinges on understanding how your customers use your app, along with a deep…
Read More
Best Android Apps – Part 2

Best Android Apps – Part 2

We have pick out some of the best Android apps to download on your new phone, including free apps, popular Android apps and some apps you might not know. Read Part 1 of this list AirDroid What is AirDroid? For those Android users feeling left out by Apple’s Continuity feature, which allows you to integrate your iPhone with your tablet and Mac, AirDroid has the answer. It’s more than just a wireless file transfer and notification tool. AirDroid also allows you to share your phone’s screen with your laptop, create a Wi-Fi hotspot, clear out RAM space, and access your…
Read More
Best Android Apps

Best Android Apps

We have pick out some of the best Android apps to download on your new phone, including free apps, popular Android apps and some apps you might not know. World Around Me (WAM) What is it? World Around Me, or WAM, is a tool for finding out about places of interest around you. Winner of the Google Play Awards ‘Early Adopter’ category, this app uses your phone’s camera to highlight local restaurants, parks, museums, cinemas, and other interesting places in your immediate area. What’s good? So what exactly is the ‘Early Adopter; award? Well, according to Google it rewards adopters…
Read More

DNS firewall – Its time to try DNS firewall

[vsw id="1xWSU4DCNZ4" source="youtube" width="425" height="344" autoplay="no"]   https://www.isc.org/wp-content/uploads/2017/12/RPZ-webinar7.ppt.pdf https://www.isc.org/mission/webinars/ http://www.securityzones.net/images/downloads/Rackspace-RPZ-Case-Study.pdf https://kb.isc.org/article/AA-00525/110/%20Building-DNS-Firewalls-with-Response-Policy-Zones-RPZ.html http://www.securityzones.net/images/downloads/BIND_RPZ_Installation_Guide.pdf  
Read More