Posts

Blockchain Security Issues

Image
  Security is one of the advantages that Bitcoin and its derivatives (e.g., Ethereum, Ripple, etc.) claim to offer compared to other digital payments. In fact, disrupting the Bitcoin network and other blockchain technologies is nearly impossible due to its advanced architecture and complexity. However,hackers are still eager to exploit some workarounds for t h eir ill intension https://onlinedegrees.und.edu/blog/5-blockchain-security-issues/

SunCrypt

Image
Ransomware operates in organized businesses, and some developers of ransomware have expanded into franchises. One such franchise family member refers to themselves as SunC rypt. SunCrypt was one of the early pioneers of triple extortion,, including file encryption, the threat of releasing stolen data, and a DDoS (distributed denial of service) attack against non-paying victims. SunCrypt often uses the PowerShell loader for delivery and deployment. https://thecyberwire.com/newsletters/privacy-briefing/4/61

Qlocker

Image
     A massive ransomware campaign is underway against QNAP devices around the world, and users are finding that their files are now stored in password-protected 7zip archives.The ransomware, called Qlocker, began targeting QNAP devices.QNAP warned that the attackers were exploiting the CVE-2021-28799 hard-coded credentials vulnerability in the HBS 3 Hybrid Backup Sync app to hack into users' devices and lock their files.  https://petri.com/qnap-nas-devices-being-targeted-by-qlocker-ransomware-again

Malware

Malware is any software that is designed to attack or cause harm on computer ,server client or network. Malware attack is a threat for any computer and can attack and infect any devices and any operating system without the victims knowledge. Malware and malicious files inside a computer system can: • Deny access to the critical components of the network • Obtain information by retrieving data from the hard drive • Disrupt the system or even render it inoperable https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html

Wiper malware

Image
Imagine working all day long on a project or coding and on the next day when you turn the computer, all of that is gone. Possibly the worst thing that could happen to you. Unfortunately, there is malware that could cause such incidents. Wiper is a malware that  has the purpose of destroying  all the data from the target computer Back in 2014 wiper made major news after south Korean hackers attacked Sony when Sony pictures were preparing to release the film “The interviewer.” The movie portrays an interview with South Korean leader Kim Jong-un. Sony Pictures was hit by wipers and lost more than $16 million.   https://www.makeuseof.com/what-is-wiper-malware/

Cross-site scripting(XSS)

Cross-site scripting(XSS) An attack is a type of injection where an attacker uses a malicious script. Cross-site scripting has two stages, first, the attacker finds a way to inject malicious code into the web page the victim visits, then the victim must visit the web page with the malicious code. If there is a specific victim attacker target, social engineering or phishing can be used to send malicious URLs to the victim.   https://thehackernews.com/ 2022/02/9-year-old-unpatched- email-hacking-bug.html

SQL injection

SQL injection is a code injection that is used to attack databases or data-driven applications. SQLI is short for SQL Injection. SQLI Exploit application’s software security vulnerability. This technique is the most common web hacking technique. It usually happens when the user is asked for input. Direct SQL Command Injection is a technique where an attacker creates or alters existing SQL commands to expose hidden data, override valuable ones, or even execute dangerous system-level commands on the database host.     https://www.acunetix.com/websitesecurity/sql-injection/