Fake Python libraries removed from PyPi when caught stealing SSH and GPG keys, reports ZDNet

Fake Python libraries removed from PyPi when caught stealing SSH and GPG keys, reports ZDNet

Yesterday, ZDNet reported that the Python security team removed two fake Python libraries from PyPI (Python Package Index). These libraries were caught stealing SSH and GPG keys from the Python projects. As per ZDNet, the two malicious clones were discovered by a German software developer Lukas Martini on 1st Dec ... Read More
Mozilla removes Avast and AVG extensions from Firefox to secure user data

Mozilla removes Avast and AVG extensions from Firefox to secure user data

Yesterday Wladimir Palant, the creator of AdBlock Plus, reported that Mozilla removed four Firefox extensions made by Avast and its subsidiary AVG. Palant also found credible reports about the extensions harvesting user data and browsing histories. The four extensions are Avast Online Security, AVG Online Security, Avast SafePrice, and AVG ... Read More
Introducing SaltStack Protect, a new SecOps solution for automated discovery and remediation of security vulnerabilities

Introducing SaltStack Protect, a new SecOps solution for automated discovery and remediation of security vulnerabilities

On Tuesday, SaltStack, the creators of intelligent automation for IT operations and security teams, announced the general availability of SaltStack Protect. SaltStack Protect is for automated discovery and remediation of security vulnerabilities across web-scale infrastructure. It is a new product available in the SaltStack SecOps family of products and is ... Read More
Yubico Previews First Biometric YubiKey

Yubico reveals Biometric YubiKey at Microsoft Ignite

On Tuesday, at the ongoing Microsoft Ignite, Yubico, the leading provider of authentication and encryption hardware, announced the long-awaited YubiKey Bio. YubiKey Bio is the first YubiKey to support fingerprint recognition for secure and seamless passwordless logins. As per the team this feature has been a top requested feature from ... Read More
Light Commands Demo #1 - Opening Garage Door

Researchers reveal Light Commands: laser-based audio injection attacks on voice-control devices like Alexa, Siri and Google Assistant

Researchers from the University of Electro-Communications in Tokyo and the University of Michigan released a paper on Monday, that gives alarming cues about the security of voice-control devices. In the research paper the researchers presented ways in which they were able to manipulate Siri, Alexa, and other devices using “Light ... Read More
Adobe confirms security vulnerability in one of their Elasticsearch servers that exposed 7.5 million Creative Cloud accounts

Adobe confirms security vulnerability in one of their Elasticsearch servers that exposed 7.5 million Creative Cloud accounts

Last week, Adobe admitted of being the victim of a serious security incident exposing the personal information of nearly 7.5 million users. The information belonged to the company’s popular Creative Cloud service. Adobe Creative Cloud service has approximately 15 million subscribers, providing them access to a suite of popular Adobe ... Read More
NCSC investigates several vulnerabilities in VPN products from Pulse secure, Palo Alto and Fortinet

NCSC investigates several vulnerabilities in VPN products from Pulse secure, Palo Alto and Fortinet

Last week, the National Cyber Security Centre (NCSC) reported that they are investigating the exploitation, by Advanced Persistent Threat (APT) actors, of known vulnerabilities in VPN products. These VPN products are from vendors like Pulse secure, Palo Alto and Fortinet. It is an ongoing activity, targeted to the UK and ... Read More
How has ethical hacking benefited the software industry

How has ethical hacking benefited the software industry

In an online world infested with hackers, we need more ethical hackers. But all around the world, hackers have long been portrayed by the media and pop culture as the bad guys. Society is taught to see them as cyber-criminals and outliers who seek to destroy systems, steal data, and ... Read More
UK’s NCSC report reveals significant ransomware, phishing, and supply chain threats to businesses

UK’s NCSC report reveals significant ransomware, phishing, and supply chain threats to businesses

Last week, the UK’s National Cyber Security Centre (NCSC) published a report on cyber incident trends in the UK from October 2018 to April 2019. The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA) has recommended this report to better understand and know how to defend against ... Read More
Hundreds of millions of Facebook users’ phone numbers found online, thanks to an exposed server, TechCrunch reports

Hundreds of millions of Facebook users’ phone numbers found online, thanks to an exposed server, TechCrunch reports

Yesterday, TechCrunch reported of an exposed server with more than 419 million records from Facebook phone numbers are discovered online. According to Zack Whittaker, TechCrunch security reporter, the server was not protected with a password and was accessible to anyone. It featured 133 million records from U.S.-based Facebook users, 18 ... Read More