Magecart Hackers Infect 17,000 Sites Through Misconfigured Amazon S3 Buckets

Magecart strikes again!

Cybersecurity researchers have identified yet another supply-chain attack carried out by payment card hackers against more than 17,000 web domains, which also include websites in the top 2,000 of Alexa rankings.

Since Magecart… Continue reading Magecart Hackers Infect 17,000 Sites Through Misconfigured Amazon S3 Buckets

Hackers infect e-commerce sites by compromising their advertising partner

Magecart strikes again, one of the most notorious hacking groups specializes in stealing credit card details from poorly-secured e-commerce websites.

According to security researchers from RiskIQ and Trend Micro, cybercriminals of a new subgroup of Ma… Continue reading Hackers infect e-commerce sites by compromising their advertising partner

CoinHive URL Shortener Abused to Secretly Mine Cryptocurrency Using Hacked Sites

Security researchers have been warning about a new malicious campaign that leverages an alternative scheme to mine cryptocurrencies without directly injecting the infamous CoinHive JavaScript into thousands of hacked websites.

Coinhive is a popular br… Continue reading CoinHive URL Shortener Abused to Secretly Mine Cryptocurrency Using Hacked Sites

WebSites Found Collecting Data from Online Forms Even Before You Click Submit

‘Do I really need to give this website so much about me?’

That’s exactly what I usually think after filling but before submitting a web form online asking for my personal details to continue.

I am sure most of you would either close the whole tab or would edit already typed details (or filled up by browser’s auto-fill feature) before clicking ‘Submit’ — Isn’t it?

But closing the tab or

Continue reading WebSites Found Collecting Data from Online Forms Even Before You Click Submit

Google Discloses Another ‘High Severity’ Microsoft Bug

Google’s security researchers disclosed details of an unpatched Microsoft vulnerability in its Edge and Internet Explorer browsers. Continue reading Google Discloses Another ‘High Severity’ Microsoft Bug

A Simple JavaScript Exploit Bypasses ASLR Protection On 22 CPU Architectures

Security researchers have discovered a chip flaw that could nullify hacking protections for millions of devices regardless of their operating system or application running on them, and the worse — the flaw can not be entirely fixed with any mere software update.

The vulnerability resides in the way the memory management unit (MMU), a component of many CPUs, works and leads to bypass the

Continue reading A Simple JavaScript Exploit Bypasses ASLR Protection On 22 CPU Architectures

Firefox Zero-Day Exploit to Unmask Tor Users Released Online

Hackers are actively exploiting a zero-day vulnerability in Firefox to unmask Tor Browser users, similar to what the FBI exploited during an investigation of a child pornography site.

Tor (The Onion Router) is an anonymity software that not only provi… Continue reading Firefox Zero-Day Exploit to Unmask Tor Users Released Online