Most Important Web Application Penetration Testing Tools & Resources for Hackers and Security Professionals

From gbhackers.com

Most Important Web Application Penetration Testing Tools & Resources for Hackers and Security Professionals

Web Application Pentesting Tools are more often used by security industries to test the vulnerabilities of web-based applications. Here you can find the Comprehensive Web Application Pentesting ToolsWeb Application Penetration Testing list that covers Performing Penetration testing Operation in all the Corporate Environments.

Read more…

Review: Group-IB Digital Risk Protection

From helpnetsecurity.com

review Group-IB Digital Risk Protection

The COVID-19 pandemic has transformed our private and working lives. It has also forced companies to extend the network perimeter due to employees working from their homes and to accelerate digital transformation efforts across the board. The latter push resulted in the hurried adoption of new systems and services outside of the enterprise, requiring serious efforts and in-depth technological knowledge to protect these new attack surfaces.

Read more…

Ransomware attacks skyrocketed in H1 2021

From helpnetsecurity.com

ransomware attacks H1 2021

In the first half (H1) of 2021, ransomware attacks skyrocketed, eclipsing the entire volume for 2020 in only six months, according to the mid-year update to the SonicWall report. In a new paradigm for cybercrime, SonicWall is analyzing how threat actors are using any means possible to further their malicious intents.

Read more…

DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos

From malware.news

DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos

Following the discovery of Hafnium attacks targeting Microsoft Exchange vulnerabilities, the Cybereason Nocturnus and Incident Response teams proactively hunted for various threat actors trying to leverage similar techniques in-the-wild. In the beginning of 2021, the Cybereason Nocturnus Team investigated clusters of intrusions detected targeting the telecommunications industry across Southeast Asia. During the investigation, three clusters of activity were identified and showed significant connections to known threat actors, all suspected to be operating on behalf of Chinese state interests.

The report comes on the heels of the Biden administration’s public rebuke of China’s Ministry of State Security for the recent HAFNIUM attacks that exploited vulnerabilities in unpatched Microsoft Exchange Servers and put thousands of organizations worldwide at risk. Exploitation of these same vulnerabilities were central to the success of the attacks detailed in this research.

Read more…

Hackers Leaked 751GB Source Code Data of EA Games Including FIFA 21

From cybersecuritynews.com

Source Code Data of EA

Hackers release 751GB of compressed EA data containing FIFA 21 source code. According to a copy of the dump acquired by The Record, “the leaked files contain the source code of the FIFA 21 soccer game, including tools to support the company’s server-side services”.

The data, dumped on an underground cybercrime forum on Monday, July 26, is at the present being widely distributed on torrent sites.

In this case, the hackers claimed to have gained access to the data after buying authentication cookies for an EA internal Slack channel from a dark web marketplace called Genesis.

Read more…

SecureWorx, an Australian Cybersecurity Firm Acquired by EY

From ehackingnews.com

SecureWorx, a managed services provider, has been bought by Ernst & Young (EY) Australia for an undisclosed sum. SecureWorx, based in Melbourne, specializes in multi-cloud services, managed security operations, and security advisory services for businesses that handle sensitive data. It also offers managed security operations services 24 hours a day, seven days a week, with government-approved staff and facilities. 
“Cyber security is a critical business function that has moved beyond our clients’ technology agenda,” said recently installed EY Australia CEO David Larocca. “This is because we’re seeing a dramatic escalation in the frequency and impact of ransomware attacks that are changing the way Boards are accountable to stakeholders. Our clients are telling us that cybersecurity is one of their greatest concerns.” 

Read more…

Website Risk Analyzer Finds Threats in Your Third Party Code

From securityboulevard.com

PerimeterX recently released a free scanner to help you quickly assess script-related security risks in your web applications. If you want to skip the details and check it out right now, click here. Or keep reading for more detail on why script-based vulnerabilities are so common and how to address the issue long-term..

As experienced security professionals, most of you are familiar with the security axiom “you can’t protect what you can’t see.” Maintaining line-of-sight into your web applications environment is the foundation for implementing effective security controls and remediating risks before they are exploited.

Read more…