Critical Bugs Found On ‘Ultimate Member’ Plugin | UPDATE IMMEDIATELY !
Wordfence’s Threat Intelligence team disclosed several vulnerabilities in Ultimate Member, a WordPress plugin installed on over 100,000 sites. These flaws made it possible for attackers to escalate their privileges to those of an administrator and take over a WordPress site. Ultimate Member is an extensible WordPress...
Bijay Pokharel,
November 10, 2020
4 min read
The EU May Be Looking Into Breaking End-To-End Encrypted Chats
In the EU Council of Ministers, a resolution was made ready within five days, obliging platform operators such as WhatsApp, Signal and Co. to create master keys for monitoring E2E-encrypted chats and messages, the ORF (Austrian Broadcasting Corporation) reports. The ORF obtained an internal draft in which...
Bijay Pokharel,
November 10, 2020
3 min read
Hosting Provider Exposed 63 Million Customer Records
A hosting provider exposed over 63 million customer records via an open elastic search database containing verbose logs with plain-text username/password credentials for numerous WordPress, Magento and other sites, securethoughts reports. The database appeared to belong to the Texas-based cloud application hosting provider, Cloud Clusters...
Bijay Pokharel,
November 9, 2020
2 min read
FBI : Cyber-Criminals Target Misconfigured SonarQube Instances to Access Proprietary Source Code of US Government Agencies and Businesses
Since April 2020, unidentified cyber actors have actively targeted vulnerable SonarQube instances to access source code repositories of US government agencies and private businesses, the FBI said in an alert sent out last month and made public this week on its website. The actors exploit known configuration...
Bijay Pokharel,
November 7, 2020
1 min read
Cyber-Criminal is Selling 34 Million User Records Stolen From 17 Companies
A hacker is selling account databases containing an aggregate total of 34 million user records that they claim were stolen from seventeen companies during data breaches, according to Bleepingcomputer. On October 28th, a data breach broker created a new topic on a hacker forum to...
Bijay Pokharel,
November 1, 2020
2 min read
What Is Spyware? And How To Remove It
Spyware is classified as a type of malware — malicious software designed to gain access to or damage your computer, often without your knowledge. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.
Bijay Pokharel,
October 19, 2020
3 min read
How To Stop Online Sexual Harassment And Protect Yourself
Online or cyber sexual harassment encompasses a range of unwanted, unwelcome, or unauthorized behaviors, sexual in nature, that are addressed to or shared about an individual through digital communication channels.
Bijay Pokharel,
October 15, 2020
7 min read
Social Media Safety Tips For Women For A Safer Digital Life
According to a study by the Pew Research Center, most online abuse takes place on social media. Although men are also subject to online harassment – which includes name-calling, derision, and physical threats – the study found that online, women are more than twice as...
Bijay Pokharel,
October 14, 2020
6 min read
5 Things To Do If Your Email Account Is Hacked
Cybercriminals usually hacked your email account to access your personal data. We link everything from online banking to federal taxes with our emails, recovery from a hack is extremely time-sensitive. You’ll have to act fast and carefully if you want to minimize the damage to...
Bijay Pokharel,
October 13, 2020
6 min read
5 Risks Of Using Free VPN Services
Injecting malware into your device is one of the common traits in free VPNs. Such malware can be used to steal sensitive information from your device or to encrypt your data as evident from recent ransomware attacks.
Bijay Pokharel,
October 11, 2020
4 min read
Vulnerability Exposes Over 4 Million Sites Using WPBakery | Update IMMEDIATELY!
Wordfence’s Threat Intelligence team discovered a vulnerability in WPBakery, a WordPress plugin installed on over 4.3 million sites. This flaw made it possible for authenticated attackers with contributor-level or above permissions to inject malicious JavaScript in posts. Wordfence’s Threat Intelligence has reached out to the plugin’s...
Bijay Pokharel,
October 9, 2020
3 min read
New Jersey Hospital Paid Ransomware Gang $670K To Prevent Data Leak
University Hospital New Jersey in Newark, New Jersey, paid a $670,000 ransomware demand this month to prevent the publishing of 240 GB of stolen data, including patient info. Bleepingcomputer Reported. The attack on the hospital occurred in early September by a ransomware operation known as SunCrypt,...
Bijay Pokharel,
October 4, 2020
2 min read
Swiss Watchmaker Swatch Shuts Down IT Systems To Stop Cyberattack
The Swiss watch manufacturer Swatch has fallen victim to a cyber attack. The company shut down its IT systems after this attack was discovered, Bomcity reported. Swatch Group is a Swiss watchmaker known for its colorful watches commonly found in department stores and employs over...
Bijay Pokharel,
September 30, 2020
1 min read
What Is A Cyber Attack? And How To Prevent It
A cyber attack is the deliberate exploitation of computer systems, networks, and technology-dependent enterprises. Cyber-Criminal uses malicious code to compromise your computer, logic, or data and steal, leak or hold your data hostage. A cyber attack is also known as a computer network attack (CNA).
Bijay Pokharel,
September 28, 2020
2 min read
Google Has Removed 17 Suspicious Apps From Google Play Store
Google has removed 17 suspicious apps from Google Play Store. The 17 apps, spotted by security researchers from Zscaler, were infected with the Joker (aka Bread) malware. This spyware is designed to steal SMS messages, contact lists, and device information along with silently signing up...
Bijay Pokharel,
September 27, 2020
1 min read
Windows XP Source Code Allegedly Leaked Online
The source code for Windows XP SP1 and other versions of the operating system was allegedly leaked online today. The leak was spread in a thread on the anonymous forum 4chan. Notably, the archive includes the Windows NT 3.5 and original Xbox source code dumps...
Bijay Pokharel,
September 25, 2020
1 min read
How To Hide Your Browsing History From ISPs
our ISP tracks your clicks for a number of reasons. For them, your browsing history is a revenue stream. Many ISPs compile anonymous browsing logs and sell them to marketing companies. Some Internet providers are even moving to make privacy a premium add-on, using your...
Bijay Pokharel,
September 24, 2020
4 min read
Are VPNs Legal Or Illegal?
A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable. Most important, VPN services establish secure and encrypted connections to...
Bijay Pokharel,
September 20, 2020
4 min read
What Is Cyberbullying? And How To Stop It
Cyberbullying is bullying with the use of digital technologies. It can take place on social media, messaging platforms, gaming platforms, and mobile phones. It is repeated behavior, aimed at scaring, angering, or shaming those who are targeted.
Bijay Pokharel,
September 18, 2020
8 min read
WordPress Malware Disables Security Plugins To Avoid Detection
Installing a security plugins is the best thing that we do to protect our sites from attacker. But what if an attacker disabled the plugins to avoid detection? According to a post in Sucuri blog, its showing how PHP malware exists which solves this problem...
Bijay Pokharel,
September 11, 2020
3 min read
Recent Posts
Subscribe
Cybersecurity Newsletter
You have Successfully Subscribed!
Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox. You are also consenting to our Privacy Policy and Terms of Use.