News

Over 14.5 million lines of US Green Card employers and applicants data are selling on Dark Web

Darina Shramko
July 20, 2021
📑 Table of Contents What happened with US Green Card Database? What kind of data did leak? What should you consider for your protection? What happened with US Green Card Database? Attention! If you are going to receive a Green Card - be careful because an anonymous hacker group has put up for sale all the personal data of the US Green Card staff and applicants . What happened? A few hours earlier, a message appeared on a hacker forum on the DarkNet that the personal data of applicants of the Green Card were up for sale. The leaked 2.14 GB database contains the 254 database tables and data of over 500,000 people ! What kind of data did leak? The leaked database contains almost all personal information about the US Green Card staff and applicants , namely: IP addresses of users E-mail Nationality Personal correspondence of users Immigration user codes and application status Phone numbers Place of residence Also, the seller of the database claims that he chose a random user from the...

Windows Users nightmare: a new vulnerability discovered that threatens your security.

Darina Shramko
July 20, 2021
Alert! The world is in danger again! Microsoft warns of critical vulnerability “PrintNightmare” (CVE-2021-34527) in Windows Print Spooler service. Last week the world shook with horror! On July 1, Microsoft alerted system administrators to the critical zero-day vulnerability CVE-2021-34527 in the Print Manager service of all currently supported versions of Windows. Information security specialists dubbed the discovered vulnerability "PrintNightmare" because the threat resembles a waking nightmare. The fact is that all versions of Windows released from 2008 are affected by a critical vulnerability. Millions of people are targeted by hackers eager to invade system files and take over data. Using this vulnerability, a hacker can remotely do whatever he wants on your computer: install or remove programs, copy, change or delete data, create new accounts with administrator rights. Microsoft has rated PrintNightmare the highest severity level because the print service runs by default on all...

What is the most vulnerable app of 2021? Try to avoid these programs on your devices

Ozair Malik
July 12, 2021
As of 2021, Google Play Store has the 1 st spot with an estimated 4 million apps available for download to android users. In contrast, Apple App Store stands in the 2 nd spot with around 2.4 million apps available to IOS users. Both companies' inability to security audit every app being uploaded or available over the Stores leads to a severe threat. The threat is it provides bad actors with an opportunity to upload bogus/fake Apps. These bogus Apps are only intended to steal the data as soon as the user downloads it. Alongside, the legitimate apps available for users also contain a lot of vulnerabilities and zero-days . Most of the time, these vulnerabilities and threats are unknown to their developers. However, Both the App stores have security reward programs , where the Pentesters and Security auditor submit their findings of malicious or vulnerable Apps. Now, I will share an app that is considered to be most vulnerable by a security auditor –who happens to be my friend...

What do we know about the security of the new Windows 11 so far?

Dmytro Cherkashyn
July 11, 2021
It appears quite usual (I mean not one a decade anymore) to witness the release of a new operating system from Windows. The new Windows 11 still lacks many expected features, which were implemented by other vendors, like better homeworking through free choice of mics or cameras, faster Windows update, and others. But I care mainly about another question – security . 📑 Table of Contents Microsoft claimed Windows 11 more secure than previous versions? Windows 11 exploit's the black market situation Conclusion Disclaimer: Please notice, use all mentioned in this article tools and software are exclusively volunteer. Not an author nor cooltechzone.com don't holds any responsibility for all potentially created problems. Microsoft claimed Windows 11 more secure than previous versions? While Microsoft claiming enhanced security of newly released Windows 11 version, there are almost no difference between using Windows 10 and Windows 11 in terms of software security. The biggest difference to...

How does look my private data from the hacker‘s view? What black hats find on you in the global network?

Ozair Malik
July 11, 2021
To look at your data from a black-hats view and know what they find on you in the global network, i.e., the Internet, you have to get in the shoes of a black-hat hacker and develop a hacker mindset . You will not find an article of this aptitude on any other site. I have shared my experience as an Ethical Hacker and cybersecurity expert . But a layman can't become a black-hat in a day or think, act, and behave like one over the global network. If it were that easy, everyone would have been a black hat because we as teens or adults always had an unfulfilled fantasy of getting into someone's mobile, laptop, etc., and hack or spy . Since you can't become a black-hat for a day , I got you covered. As a cyber-security expert and researcher , I have been hunting cybercriminals and black-hats for a while now after handling around 200 cases of identity or personal data theft, ransomware, and cyber espionage, etc. So I can say that I have been into black-hat shoes a lot many times. I would...

Do You Know the Power of The Dark Side?

Rakesh Naik
July 6, 2021
Ever since the inception of computing systems and devices, there have also existed many vulnerabilities in these systems as well. These vulnerabilities in the right hands lead to the improvement of a system, but in the wrong hands can cause many damages . In our article below, we will look at a particular type of vulnerability known as a Zero-Day vulnerability or simply a zero-day vulnerability. We would also be looking at the different markets where one could sell a zero-day along with the pricing and implications of these markets. 📑 Table of Contents What is a Zero-Day Vulnerability? Why are Zero-Days so Important? Selling a Zero-Day Vulnerability Zero-Day Prices: Bug Bounty Platforms vs Black Market Just Because You Can, Should You? Conclusion What is a Zero-Day Vulnerability? Image Source – “Towards Probabilistic Identification of Zero-day Attack Paths” Scholarly Article by Xiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal and John Yen No matter how well secured, every system will...

From Dummy Zero to Cyber Security Hero. What should you know to call yourself CyberSec Pro?

Darina Shramko
July 6, 2021
We were lucky to be born at a time when superheroes left the screens of cinemas and settled among us. Their job is to protect our privacy at all costs. They do not wear raincoats and bright costumes, but this does not diminish their merits in the least. These heroes are cybersecurity specialists who sometimes risk everything to save humanity from the hands of dangerous hackers who seek to disrupt our daily life. If you want to connect your life with information security , you have come to the right place because today, I will tell you all the cybersecurity secrets! How the IT labor market works, how much cybersecurity professionals earn, and what skills you need to have to become a hero of our time - you will learn about this and much more right now. Let's go! This article also: a practical guide for students of technical faculties a practical guide for people who want to work as cybersecurity specialists a practical guide for people who want to learn more about information security...