Blog

Warning – 5 New Trojanized Android Apps Spying On Users In Pakistan

Cybersecurity researchers took the wraps off a new spyware operation targeting users in Pakistan that leverages trojanized versions of legitimate Android apps to carry out covert surveillance and espionage. Designed to masquerade apps such as the Pakistan Citizen Portal, a Muslim prayer-clock app called Pakistan Salat Time, Mobile Packages Pakistan, Registered SIMs Checker, and TPL Insurance.
Read More
Upwork Releases Top 15 Most In-Demand Skills for Developers

Upwork Releases Top 15 Most In-Demand Skills for Developers

Upwork Releases Top 15 Most In-Demand Skills for Independent Web, Mobile, and Software Developers. The reason why UpWork is the best freelance marketplace is fairly simple, the huge influx of fresh projects posted every single hour on Upwork is far higher in number than any other marketplace. Upwork for a strange reason stop rolling out quarterly top skills in 2020. the last update from the company came in the third quarter of the year 2019. Well to no surprise, 2020 was a different year for everyone. The good news is, Upwork has finally released its new list of top 15…
Read More
Zoom Phishing Scam Aims To Steal Login Credentials

Zoom Phishing Scam Aims To Steal Login Credentials

As individuals and businesses become increasingly dependent on video conferencing to stay connected during the Covid-19 outbreak, fraudsters have used the opportunity to target users with a malicious Zoom phishing scam. The Zoom phishing scam begins with an email that impersonates a notification from the video conferencing platform. The email informs the recipient in different tricky ways like you have recently missed a scheduled meeting. It encourages the user to click the link for more details and access a recording of the meeting. your account has been suspended (but can be reactivated by clicking on the attached link), or you…
Read More
Microsoft issues Guidance for DNS Cache Poisoning Vulnerability

Microsoft issues Guidance for DNS Cache Poisoning Vulnerability

Microsoft issued guidance on how to mitigate a DNS cache poisoning vulnerability reported by security researchers from the University of California and Tsinghua University. Successfully exploiting the vulnerability could allow attackers to use modified DNS records to redirect a target to a malicious website under their control as part of DNS spoofing (also known as DNS cache poisoning) attacks. The end goal of such attacks is to either exploit device or software vulnerabilities to infect the target with malware or to harvest sensitive information via a phishing landing page. Impacts multiple Windows server platforms The addressing spoofing vulnerability - tracked as CVE-2020-25705 and nicknamed…
Read More
Github Code Scanning – Vulnerability Scanner by Justin Hutchings

Github Code Scanning – Vulnerability Scanner by Justin Hutchings

GitHub code scanning is a developer-first, GitHub-native approach to easily find security vulnerabilities before they reach production. We’re thrilled to announce the general availability of code scanning. You can enable it on your public repository today! One year ago, GitHub welcomed Semmle. We’ve since worked to bring the revolutionary code analysis capabilities of its CodeQL technology to GitHub users as a native capability. At GitHub Satellite in May, we released the first beta of our native integration: code scanning. Now, thanks to the thousands of developers in the community who tested and gave feedback, we’re proud to announce that code scanning is generally available. Code scanning…
Read More
The Best Marketing Material for Startups 

The Best Marketing Material for Startups 

  Most entrepreneurs behind new startups will turn to the world of digital to market their businesses. While this is a smart move considering how effective digital marketing can be, it is important not to forget about the impact of traditional print marketing. Most business experts insist that the greatest levels of success can be achieved by embracing a combination approach to marketing and finding a balance between print and digital. With that in mind, here is some advice regarding the best marketing material for startups. Business cards  The modest business card is arguably the most important piece of marketing…
Read More
Wormable Gitpaste-12 Botnet Returns to Target Linux Servers, IoT Devices

Wormable Gitpaste-12 Botnet Returns to Target Linux Servers, IoT Devices

A new wormable botnet that spreads via GitHub and Pastebin to install cryptocurrency miners and backdoors on target systems has returned with expanded capabilities to compromise web applications, IP cameras, and routers. Early last month, researchers from Juniper Threat Labs documented a crypto-mining campaign called "Gitpaste-12," which used GitHub to host malicious code containing as many as 12 known attack modules that are executed via commands downloaded from a Pastebin URL. The attacks occurred during a 12-day period starting from October 15, 2020, before both the Pastebin URL and repository were shut down on October 30, 2020. Now according to…
Read More
PgMiner botnet attacks weakly secured PostgreSQL databases

PgMiner botnet attacks weakly secured PostgreSQL databases

Security researchers have discovered this week a botnet operation that targets PostgreSQL databases to install a cryptocurrency miner. Codenamed by researchers as PgMiner, the botnet is just the latest in a long list of recent cybercrime operations that target web-tech for monetary profits. According to researchers at Palo Alto Networks' Unit 42, the botnet operates by performing brute-force attacks against internet-accessible PostgreSQL databases. The attacks follow a simple pattern. The botnet randomly picks a public network range (e.g., 18.xxx.xxx.xxx) and then iterates through all IP addresses part of that range, searching for systems that have the PostgreSQL port (port 5432) exposed…
Read More
Kubernetes is dropping Docker support – What does it mean for YOU?

Kubernetes is dropping Docker support – What does it mean for YOU?

[vc_row][vc_column][vc_column_text]Kubernetes is dropping Docker support! Understand the reason behind and how it affects YOU. Kubernetes deprecated Docker since version 1.20!. What the Kubernetes announcement actually means and how it will affect you: ► as a software developer, who is using Docker and Kubernetes ► as a DevOps engineer, who is administering Kubernetes using a Managed Kubernetes Service or a self-managed Kubernetes cluster.   Useful Links: Dockershim FAQs Don't Panic: Kubernetes and Docker[/vc_column_text][vc_video link="https://youtu.be/7KUdmFyefSA"][penci_videos_playlist][penci_block_video][/vc_column][/vc_row][vc_row][vc_column][vc_column_text] ▬▬▬▬▬▬ T I M E S T A M P S ⏰ ▬▬▬▬▬▬ 0:00 - Intro 0:18 - Why has Docker been deprecated? 3:10 - Container Runtime…
Read More
E-Commerce is in huge demand in 2021 – Are you Ready?

E-Commerce is in huge demand in 2021 – Are you Ready?

E-commerce is on a rise and one would not be surprised if there are many rags to rich success stories linked to the e-commerce business in 2021. The answer is the COVID-19 pandemic. After all, the world’s richest man is Jeff Bezos, CEO of Amazon, the world’s largest e-commerce business with an economic footprint all over the globe. The COVID pandemic has dramatically shifted e-commerce in the year 2020. E-commerce has seen a huge 129% year-over-year growth in the U.S and Canadian shores. This accounts for a massive 146% growth in internet retail orders. Many brick and mortar stores have now gone online to…
Read More