Skip to content
Usman Ahzaz Mufti
Happening
Usman Ahzaz MuftiUsman Ahzaz Mufti
  • Cyber Security
  • Updates
  • Cyber Security
  • Updates

Tag Archives: Cyber Security

You are here:
  1. Home
  2. Entries tagged with "Cyber Security"

ETHICAL HACKING – ACCESSING WEB SERVERS

Cyber SecurityBy Usman Ahzaz MuftiJune 28, 2020Leave a comment

During ethical hacking, a researcher searches for vulnerabilities. An ethical hacker may have several reasons for gaining unauthorized access to a web server, but the main one is to test server applications for gaps. To gain access, as a rule, the same tools and methods are used that the attackers possess, and if successful, you can…

Winnti Group

Video Game Developers Victimized by Winnti Group Hacking

Cyber SecurityBy Usman Ahzaz MuftiMay 23, 2020Leave a comment

Some Video Game Developers were allegedly hit by Winnti Group. The attack was to get a hold of in-game rewards and the in-game currency. The PipeMon Modular Malware was used to victimize the vulnerable game developers. Video game developers have been attacked by the Winnti group. Attackers are allegedly targeted at stealing in-game money and…

ProLock Ransomware

ProLock Ransomware Connects with The Qakbot Trojan

Cyber SecurityBy Usman Ahzaz MuftiMay 18, 2020Leave a comment

A Prolock Ransomware has been used recently for attacks on the US Government and other financial institutes along with healthcare facilities. The FBI has been clear that this Ransomware was used for the attacks, while Prolock is among the world’s largest supplier of ATMs and technology providers for Payments. Earlier this month, the US FBI…

Microsoft’s GitHub Repository hacked? 500GB worth of Data claimed.

Cyber SecurityBy Usman Ahzaz MuftiMay 9, 2020Leave a comment

An unknown hacker claims to have theft 500GB worth of data from not just any organization, from Microsoft’s GitHub Repository. Microsoft itself is such a huge name that seems impossible to trust the authenticity of the leak yet the hacker offered 1GB of data of a hacker forum. The hackers on the Bleeping Computer Portal…

VPN

Users of Famous VPN’s at Risk of Cyber Attacks

Cyber SecurityBy Usman Ahzaz MuftiMay 7, 2020Leave a comment

Vulnerabilities were found in VPN services that allowed the intruders to intercept and distribute fake updates. However, out of the twenty most popular services, only two of them were found risking the users. The PrivateVPN and Betternet VPN were accused of these vulnerabilities. Which gave the attackers a key source to spread malware or steal…

Google Chrome

Spam Extensions in Google Chrome Manipulates Users Towards Misleading Content/Applications

Cyber SecurityBy Usman Ahzaz MuftiMay 7, 2020Leave a comment

Google Chrome is one of the widely used web-browser, the perks of Google Chrome are its wide variety of extensions. Lately, Google addressed the issue with an updated Chrome Web Store Policy, which blocks the spam extensions which might be significantly a vulnerability to a user’s data. The extensions take the users to misleading content…

Vulnerability of Apple

Vulnerable to Cyber ​​Attacks? The Apple Image I / O Framework

Cyber Security, UpdatesBy Usman Ahzaz MuftiMay 3, 2020Leave a comment

Google Project Zero Team researched on a framework and found somewhat six vulnerabilities in the multimedia processing component of Apple. The vulnerabilities were originated from the Image I/O framework. The team found eight more of these fragilities in the OpenEXR library. Researchers managed to identify six vulnerabilities in Image I / O and eight more…

PowerPoint

PowerPoint is Vulnerable and puts users prone to attacks

Cyber Security, UpdatesBy Usman Ahzaz MuftiApril 12, 2020Leave a comment

A security-based researcher Usman Ahzaz Mufti, researched and opinionated that, a fresh manipulating vector permits an attacker to exploit a PowerPoint file, the exploitation is done as it downloads and installs a malware as the mouse is floated. Restriction in PowerPoint which forbids attaching a deleted file to the action called as ‘Follow the Hyperlink’…

Go to Top