Skip to content

TechKranti

CyberSecurity Revolution

30-Aug-23: In Security News Today

August 30, 2023 Amey Anekar Cyber Security News & Updates

Hackers Can Exploit Windows Container Isolation Framework to Bypass Endpoint Security Researchers have discovered that hackers can manipulate the Windows Container Isolation Framework to bypass endpoint security solutions. By leveraging the Windows Container Isolation FS

Continue reading
Burp

BurpSuite Setup For An Optimal Hacking Experience

August 29, 2023 Amey Anekar Bounty Hunting

This article will provide you tips to configure your Burp for an optimal hacking experience. De-clutter your Burp to de-clutter your mind. Noisy Proxy traffic is a deterrent to an optimal hacking experience. Cut the crap and follow 4 simple steps towards peace of mind.

Continue reading

29-Aug-23: In Security News Today

August 29, 2023 Amey Anekar Cyber Security News & Updates

New Android Trojan MMRat Allows Attackers to Control Devices and Perform Bank Fraud A newly identified Android trojan called MMRat has been targeting users in Southeast Asia, allowing attackers to remotely control devices and perform

Continue reading

28-Aug-23: In Security News Today

August 28, 2023 Amey Anekar Cyber Security News & Updates

Financial Firms Hit by MOVEit Cyberattacks Face Lawsuits TD Ameritrade and Charles Schwab are now facing class action lawsuits in the US District Court in Nebraska over the MOVEit zero-day vulnerability breach. The lawsuits accuse

Continue reading

25-Aug-23: In Security News Today

August 25, 2023 Amey Anekar Cyber Security News & Updates

Is Bias in AI Algorithms a Threat to Cloud Security? The use of AI in threat detection and response in cloud security is crucial, but it cannot replace human intelligence and expertise. Bias in AI

Continue reading

24-Aug-23: In Security News Today

August 24, 2023 Amey Anekar Cyber Security News & Updates

New Strain of Ransomware Targets Small Businesses and Individuals Researchers have discovered a new strain of ransomware called TZW that has been active since 2019 and targets individuals and small businesses. Unlike typical ransomware, TZW

Continue reading

23-Aug-23: In Security News Today

August 23, 2023 Amey Anekar Cyber Security News & Updates

Russian Ransomware Group Cuba Uses Advanced Techniques in Attacks The Russian ransomware group known as Cuba has been targeting US organizations and critical infrastructure providers in highly profitable ransomware attacks. The group employs a variety

Continue reading

22-Aug-23: In Security News Today

August 22, 2023 Amey Anekar Cyber Security News & Updates

Vulnerabilities in TP-Link Tapo L530E Smart Bulb and App Allow Wi-Fi Password Theft Academic researchers have identified four vulnerabilities in the TP-Link Tapo L530E smart bulb and its accompanying mobile application that can be exploited

Continue reading

Browser-in-the-Browser (BitB) Attack

August 22, 2023 Amey Anekar Cyber Security Gyaan

When I look back at my nascent years in Cybersecurity (circa 2008) it was extremely easy to fool users into divulging their credentials on phishing pages. Almost all the users were naive. Back then, I

Continue reading

21-Aug-23: In Security News Today

August 21, 2023 Amey Anekar Cyber Security News & Updates

Researchers Discover Fake Airplane Mode Attack on iPhones Researchers at Jamf have discovered a technique called ‘fake airplane mode’ that allows attackers to maintain connectivity on iPhones while making users believe they are offline. The

Continue reading

Posts pagination

«Previous Posts 1 … 11 12 13 14 15 … 18 Next Posts»

About Me

Hey There, I am Amey Anekar - Cyber Security Specialist with a passion for solving security problems even when resources are limited. I've been fortunate to develop a knack for gauging an organization's cyber security posture and helping them plan a transition towards becoming more resilient in the face of cyber threats. It's a privilege to be able to contribute to the field and assist organizations in safeguarding their digital assets. Get In Touch    

Search TechKranti

Top Posts & Pages

  • What is "Content-Type: application/x-protobuf": Protobuf Explained For Hackers
  • IDOR through MongoDB Object IDs Prediction
  • How I discovered an SSRF leading to AWS Metadata Leakage
  • Preventing/Fixing SSRF Issues

Categories

  • Bounty Hunting
  • Chrome Extension Development
  • Cyber Security Gyaan
  • Cyber Security News & Updates
  • Malware Reports & Analysis
  • Programming
  • Secure Coding
  • Tips & Tricks

Follow Us

  • Facebook
  • Twitter
WordPress Theme: Mercia by ThemeZee.