#Trusted Cybersecurity News Platform
Follow us
Subscribe to Newsletter
Twitter Password Reset Bug Exposed User Accounts

Twitter Password Reset Bug Exposed User Accounts

September 22, 2022 Tech / Vulnerability
Twitter logged out some users after addressing a bug where some Twitter accounts remained logged on some mobile devices after voluntary password resets. "That means that if you proactively changed your password on one device, but still had an open session on another device, that session may not have been closed. Web sessions were not affected and were closed appropriately," Twitter explained .   Image: Twitter There are some potential privacy risks for Twitter users who were affected by this bug, including having their accounts accessed by others who got their hands on devices that remained logged in without the user's knowledge. Because of this, the company reached out to those who might have been impacted and logged them out of their accounts on all active sessions across all devices. "We have directly informed the people we were able to identify who may have been affected by this, proactively logged them out of open sessions across devices, and prom
DDoS and bot attacks in 2022: Business sectors at risk and how to defend

DDoS and bot attacks in 2022: Business sectors at risk and how to defend

September 22, 2022 Cyber Security / Hacking and Security
According to Gcore, in 2022, the number and volume of DDoS attacks will roughly double compared to 2021. The average attack power will grow from 150–300 Gbps to 500–700 Gbps.   Image: Mask According to Gcore, in 2022, the number and volume of DDoS attacks will roughly double compared to 2021. The average attack power will grow from 150–300 Gbps to 500–700 Gbps. Both ordinary users and businesses in any industry—fintech, gaming, e-commerce, and others—are being targeted. Andrew Slastenov, Head of Web Security at Gcore, talks to his colleagues about trends in the cybersecurity market: which business sectors are being attacked more often than others in 2022? — Fintech, gaming, and e-commerce are suffering the most. We recently covered this in our study DDoS attack trends in Q1-Q2 2022 . For example, in March of this year, we resisted a powerful UDP flood attack on a gaming company, and in April, we countered an over 24-hour TCP flood attack on a fintech service. New cases are
How to use the weird new photo cutout feature in iOS 16

How to use the weird new photo cutout feature in iOS 16

September 22, 2022 How to / iOS
If you’ve updated your iPhone to iOS 16 you might have noticed a strange animation when tapping on a photo. It’s a bit like a flash of lightning zapping across an object in the photo, after which the light flashes around the object to highlight what has been selected. The chances are that you’re wondering what this weird feature is and what you’re supposed to do with it. Image: Jim Martin / Foundry   Apple rather uncreatively calls it “Lift subject from background” but, literally, that’s exactly what it does. It’s a really clever bit of software trickery that identifies the subject in a photo and isolates it from the background. All you have to do it tap on a person, pet or some other object in a photo – it has to the main one – and you’ll see the odd animation to show you that’s worked. Two options should pop up: Copy and Share. Image: Jim Martin / Foundry If you tap Copy, you can then paste the cut out image (which appears on a white background)
Garena Free Fire redeem codes for today, 21 September: Here’s how to get FF rewards

Garena Free Fire redeem codes for today, 21 September: Here’s how to get FF rewards

September 21, 2022 Gaming
Garena Free Fire releases redeem codes on an everyday basis. The 12-digit redeem code consists of alphabets and numbers. Players can get rewards such as skins for in-game weapons and characters to improve their gaming experience.  Garena Free fire is banned in India. However, if you are located outside India, you can access the reward codes and redeem them. For that you will be required to visit official Garena Free Fire reward site and log in to your Facebook, Google, and Twitter IDs to access the Free Fire redemption page.    Check out the Garena Free Fire Redeem Codes for September 20, 2022  ZRJAPH294KV5 Y6ACLK7KUD1N SARG886AV5GR FF10GCGXRNHY YXY3EGTLHGJX WLSGJXS5KFYR FF119MB3PFA5 FF10617KGUF9 X99TK56XDJ4X FF11HHGCGK3B B6IYCTNH4PV3 FF11DAKX4WHV 8F3QZKNTLWBZ FF11WFMPP956 FF1164XNJZ2V FF11NJN5YS3E WOJJAFV3TU5E MCPTFNXZF4TA How to Redeem Garena Free Fire codes for today, September 20, 2022 Step 1: Go to the official Garena Free Fire redemption portal Step
Grand Theft Auto Publisher Rockstar Games Hacked

Grand Theft Auto Publisher Rockstar Games Hacked

September 21, 2022 Hacking and Security
Threat actor Lapsus$ is now seemingly responsible for hacking gaming giant Rockstar Games after targeting mega-brands like Microsoft, Cisco, Samsung, Nvidia, Okta and probably Uber. An account operating name ‘teapotuberhacker’ posted on GTAForums around 90 videos of what appeared to be in-development footage of the upcoming Rockstar Games installment, Grand Theft Auto 6 – that the publisher confirmed it was working on earlier this year.   Image: GTA The videos, which totaled around 50 minutes of footage, included short clips of animation tests to more detailed animation scenes. They were then widely shared on social media. After posting the alleged in-development footage on September 18, 2022, teapotuberhacker left a message claiming they wanted to “negotiate a deal” with the game publisher to return unreleased data, including the source code for Grand Theft Auto 5 and the in-development version of Grand Theft Auto 6. “This is not the first case where a cyber-crimina
Uber hacked via basic smishing attack

Uber hacked via basic smishing attack

September 16, 2022 Cyber Attack / Hacking and Security
A smishing attack on Thursday led to a wide range of Uber's internal systems being breached by a seemingly unaffiliated teenage hacker, it has been claimed.   Image: UberCards_shutterstock A report first emerged in The New York Times that the ride-sharing company had been hacked, with the threat actor themselves getting in touch with the publication to allege that he had gained access to internal systems such as Uber’s internal email, cloud storage systems and code repositories through a simple social engineering attack. In a text message sent to an Uber employee, the hacker impersonated an IT worker and convinced them that it was necessary to share an internal password. As a variant of phishing in which SMS is used to mine targets for sensitive information, smishing is often combined with social engineering tricks for increased effectiveness.  Victims may be more easily persuaded to hand over credentials to a supposedly trustworthy source if the attacker makes the s
Uber Says It's Investigating a Potential Breach of Its Computer Systems

Uber Says It's Investigating a Potential Breach of Its Computer Systems

September 16, 2022 data breach
Image: Uber Gif Ride hailing giant Uber disclosed Thursday it's responding to a cybersecurity incident involving a breach of its network and that it's in touch with law enforcement authorities. The New York Times first reported the incident. The company pointed to its tweeted statement when asked for comment on the matter.   The hack is said to have forced the company to take its internal communications and engineering systems offline as it investigated the extent of the breach. The publication said the malicious intruder compromised an employee's Slack account, and leveraged it to broadcast a message that the company had "suffered a data breach," in addition to listing internal databases that's supposed to have been compromised. "It appeared that the hacker was later able to gain access to other internal systems, posting an explicit photo on an internal information page for employees," the New York Times said. This is not Uber's
YouTube Users Targeted By RedLine Self-Spreading Stealer

YouTube Users Targeted By RedLine Self-Spreading Stealer

September 16, 2022 Hacking and Security / YouTube
Image: Gamer Threat actors have conducted a campaign relying on the RedLine stealer and targeting YouTube users. The news comes from cybersecurity researchers at Kaspersky, who published an advisory about the campaign earlier today. “Discovered in March 2020, RedLine is currently one of the most common Trojans used to steal passwords and credentials from browsers, FTP clients and desktop messengers,” wrote Oleg Kupreev in the technical write–up. “It is openly available on underground hacker forums for just a few hundred dollars, a relatively small price tag for malware." According to the security expert, RedLine can steal usernames, passwords, cookies, bank card details and autofill data from Chromium– and Gecko–based browsers. It is also capable of obtaining data from crypto wallets, instant messengers and FTP/SSH/VPN clients and files with particular extensions from devices.  The malware can reportedly download and run third–party software tools, execute comma
WordPress plugin vulnerability leaves sites open to total takeover

WordPress plugin vulnerability leaves sites open to total takeover

September 14, 2022 Hacking and Security / Vulnerability
Security firm WordFence has warned of an actively exploited vulnerability in a widely-used WordPress plugin that could leave websites totally exposed to hackers. WPGateway is a paid plugin that gives WordPress users the ability to manage their website from a centralised dashboard. The flaw, designated CVE-2022-3180 , allows for threat actors to add their own profile with administrator access to the dashboard, and completely take over a victim’s website. Image: WordPress WordFence, which provides a firewall service for WordPress websites, released a rule to block the exploit for paying customers on its Premium, Care and Response packages ($99, $490 and $950 per year respectively). However, customers using its free package will not receive protection against attacks until October 8, which could leave small or medium businesses exposed. For a business, total website takoever could lead to the exfiltration of sensitive financial information or simply lead to the destruction of
How to change Siri’s voice on an iPhone or iPad

How to change Siri’s voice on an iPhone or iPad

September 14, 2022 Apple / How to
Image: Foundry When Siri first launched on the iPhone 4s, Apple’s virtual assistant didn’t sound all that human. However, with recent iterations of iPhone, Siri sounds much more natural with more diversity not only in the voice itself, but the tone and even regional dialects. It makes using Apple’s hands-free “Hey Siri” tech much more natural, like you’re conversing with a person and not a robot. While the accent will still default to the region you’re in, you’re free to change both the accent and gender of Siri’s voice on your iPhone or iPad with just a few taps. If you want to change Siri to speak in an American, Australian, British, Indian or South African accent, we’ve got you covered. How to change Siri’s voice and gender on iPhone and iPad 1. Open the Settings app Image: Foundry The first step is to open the Settings app on your iOS device. For those new to iOS, it’s the app with the mechanical cog icon. 2. Tap Siri & Search Image : Foundry From the main Se
Cisco confirms data breach following Yanluowang ransomware attack in May

Cisco confirms data breach following Yanluowang ransomware attack in May

September 14, 2022 computer security / Cyber Security
Cisco has confirmed data Yanluowang ransomware gang published on its leak site was indeed stolen from the firm during the May cyberattack. The firm’s network was breached after hackers compromised an employee's VPN account. Even so, the tech giant affirms the leak has no impact on its business, as originally assessed. Image: Cisco   According to the company, the stolen records comprised non-sensitive files from the employee’s Box folder. However, the attack was contained before Yanluowang ransomware could start encrypting systems. “On September 11, 2022, the bad actors who previously published a list of file names from this security incident to the dark web, posted the actual contents of the same files to the same location on the dark web. The content of these files match what we already identified and disclosed,” explained Cisco. “Our previous analysis of this incident remains unchanged-we continue to see no impact to our business, including Cisco products or services
iPhone 14 Pro: Everything you need to know

iPhone 14 Pro: Everything you need to know

September 11, 2022 Apple / Gadgets
Apple’s new iPhone 14 Pro and iPhone 14 Pro Max have a new screen design that does away with the familiar notch in favour of a pill-shaped and circular cut-out in the screen that houses the sensor array for Face ID and cameras, with the proximity sensor now behind the display. The phones fill in the gap between the two with black pixels. Apple calls this created long pill shape the Dynamic Island, which will appear to expand and retract depending on what you’re doing on the phone, from music playback, to using Face ID, to making payments. It can also display things like sports scores when you’re in other apps. Image: Apple The iPhone 14 Pro and 14 Pro Max also have slightly slimmer bezels but are still 6.1in and 6.7in in size and are the first iPhones to support always-on display features that we’ve seen on Android phones for the past few years, allowing information like time, date, and notifications to be glanced at even when the screen isn’t fully on. Controversially, the iPhone 14 P
10 Best Cracked Apk Sites or Cracked Apps Sites

10 Best Cracked Apk Sites or Cracked Apps Sites

September 11, 2022 Apps & Software / Internet & Social
There are 2.87 million apps available on Google Play Store. Some of them you can easily avail for free, while some are paid apps. Many people desperately want to purchase the paid or premium version of the apps but sometimes are short of cash. Nowadays, getting any premium or paid app for free is an easy task as there are many cracked apps sites available to download cracked apps. However, not all cracked apps or cracked sites are safe and secure. Image: Android In order to simplify your task of searching for the best cracked Apk sites, we have come up with the 10 best-cracked apps sites or cracked apk sites. So, if you are those who cannot afford to buy the paid or premium android apps can easily avail the benefits of these sites. Below mentioned are the most trusted and secured cracked Apk sites that provide free modded and cracked android apps.  Best Cracked Apk Sites 1. Apk Pure – Cracked Apk Site Apk Pure is one of the best-cracked app sites which is very safe to use. It does not
iCloud Shared Photo Library won’t launch with iOS 16

iCloud Shared Photo Library won’t launch with iOS 16

September 10, 2022 Apple / iCloud
Apple is delaying the release of iOS 16’s iCloud Shared Photo Library feature, saying it’s “coming later this year” instead of when the mobile operating system refresh launches on September 12th (via AppleInsider). An archived version of the iOS 16 webpage shows the notice about the delay was added sometime this week. When it does launch, the feature will let you and up to five other people automatically share a collection of photos, with the option of including all the photos in your personal library, photos from after a specific date, or that include specific people. Image: iCloud It’s not particularly unusual for Apple to withhold features from the initial release — last year, iOS 15 launched without SharePlay, Universal Control, and better Find My support for AirPods. The features then trickled out over the next few months in point releases. iOS 16 doesn’t seem to have as many features that are getting pushed back, though the iPadOS 16 update for Apple’s tablets is delayed and will
Overview, Uses, and Key Differences Between C++ and Python

Overview, Uses, and Key Differences Between C++ and Python

September 10, 2022 Python / Tech
C++ and Python, two of the most popular and widely used programming languages, are not only adaptable and object-oriented but can also be used to produce a diverse range of applications and functional code. As a result, the debate over Python vs. C++ is a fascinating one, since the two programming languages have very different syntaxes, use cases, and general approaches to programming. As a result, many struggle to choose between the two programming languages for their software development requirements. Image: Python vs C++ What exactly is C++? C++ is a widely used general-purpose programming language. You may use the language to encapsulate both high-level and low-level language elements. As a consequence, it has been designated as an intermediate language. It is also utilized to create complicated systems when hardware-level coding is required. What exactly is Python? Python is a high-level abstraction object-oriented programming language. It features built-in data structures as well
Top 3 tech companies were affected by cyber attacks in bangladesh

Top 3 tech companies were affected by cyber attacks in bangladesh

September 10, 2022 Akiz Group / Beximco
Various companies in Bangladesh are also being attacked by ransomware . Big commercial companies like Beximco , Akiz and Digicon Technologies have been attacked. By attacking these companies, hackers have taken away a lot of sensitive information. BTCL, Grameenphone Limited, Axiata Limited, Link3 Technologies, Systems Solutions and Development Technologies Limited, Bandhu Network Limited, Aamra Network Limited, Banglalink Digital Communications Limited and Teletalk Bangladesh Limited are at the top of the attack risk list. Image: Google These data have been obtained from the research report ‘ Ransomware Landscape Bangladesh 2022’ published on the cyber situation and ransomware situation in Bangladesh. The report was published by BGD e-GOV CIRT, the government’s cyber security agency. BGD e-GOV CIRT, a cyber-security agency under the government’s ICT Division, has researched the cyber situation and ransomware situation in Bangladesh. They released a report titled ‘Ransomware Landscap
Asus ROG Phone 6 Pro review

Asus ROG Phone 6 Pro review

September 10, 2022 Asus / Gadgets
Gaming phones are a relatively modern concept, with the first handsets arriving just five years ago. Several brands have been vying for your attention since then, including Razer, Black Shark and Red Magic.    But it’s Asus that has emerged as the market leader, going above and beyond what you’d expect from any phone. However, ROG (Republic of gamers) Phones are typically more expensive than rival handsets, so it’s not always an obvious choice. Image: Anyron Copeman / Foundry When it comes to the ROG Phone 6 Series, things get even more complicated. There are regular and Pro models to choose from, with the latter reviewed here.   Does it do enough to justify the premium price tag, or would paying less still get you everything you want from a gaming phone? I spent a few weeks with 6 Pro to find out.  Design and build Premium but bulky design  Eye-catching gamer aesthetic  Secondary display has limited functionality  The ROG Phones have never tried to hide the fact that they are gaming p