SlideShare a Scribd company logo
NEWS BYTES
By Jaskaran Singh Narula
About Me:-
1)Blogger on www.deltaheads.com
2)Information Security Enthusiast
3)Computer Networking Geek
4) Sad but True I am an Engineer.
Follow me on twitter @JaskaranNarula
Major Hacks of the Month
● NSA Got HAcked --- What When how Who and why??.
● PIL Filed Against Pokemon Go In India for hurting relegious
sentiments.
● USB KILL to destory pc in Secounds.
● ’Alarming' rise in Ransomwares Attacks.
● Customs Services of Ukraine Government Hacked By Anonymous,
1 GB of Classified Data Stolen.
NSA Got Hacked !! What? When?How?Who
and Why??
The Shadow brokers Demanded for around 1Million Bitcoins nearly
around $568Million dollars.
Although news over the web is the hack was never proven actually,
Files were realised on "Github" but were down in a mater of time
because of the company policies, which says they can keep "Stealed"
products on the platform.
Exploits by Shadow Brokers
Here are some latest Exploits by this hacking group, moreover this group
has released the tools on “Github” after the NSA Hacking case happened.
Here is the link to view there exploits in details
https://www.exploit-db.com/author/?a=8712
PIL Filed Against Pokemon Go In India
for hurting Relegious Sentiments.
A Gujarat resident, Alay Anil Dave
has recently filed a Public Interest
Litigation (PIL) in the Gujarat High
Court against Niantic, developers of
Pokémon Go, over allegations that the
game is hurting religious sentiments of
Hindus and Jains by showing virtual
eggs in places of worship of different
religious groups.
This game is reported to have almost as many daily active users on Twitter.
And Due to this ban on Pokemon many Third Party Apps are Released which resemble
to the game but are actually for the purpose for Hacking your Cell phone
Popularly Know as “Pokemon Go Ransomware”.
USB KILL to Destroy Computers in
“Seconds”.
● As the company explains, when plugged in, the USB Kill 2.0 stick
rapidly charges its capacitors via the USB power supply, and then
discharges – all in a matter of seconds.
● The USB stick discharges 200 volts DC power over the data lines of
the host machine and this charge-and-discharge cycle is repeated
several numbers of times in just one second, until the USB Kill stick is
removed.
‘Alarming’ rise in Ransomwares
Attacks
A Canadian university has paid
hackers to restore access to data
they had turned into the digital
equivalent of gibberish.
The University of Calgary transferred
20,000 Canadian dollars-worth of
bitcoins ($15,780; £10,840) after it was
unable to unwind damage caused by a
type of attack known as
ransomware.The malware caused
emails and other files to become
encrypted.
Customs Services of Ukraine Government Hacked
By Anonymous, 1 GB of Classified Data Stolen.
● Anonymous Hacker Group now Targeted Ukraine Government, hacked
there "DataBase" and Stole of Over 1GB of Classified Data from There
Severs.
● During this round of cyber attack the main target was the Customs
department of Ukraine. In their press release Anonymous took
responsibility of performing onerous attack on CUSTOMS.GOV.UA
also.
● In This Cyber Attack many Gov Documents were hacked from the
server and were made public of the Ukraine, All these paper revealed
the scams of corruption cases running internally in the gov. Said by
Anonymous.
Interesting Bits
● Brazzers.com got Hacked Exposes 800,000 email IDs and Password.
After Brazzers got hacked, AshleyMadison.com, a Canadian dating website, was also
hacked by a vigilante hacking group. During that attack, more than 37 million user
accounts’ details were leaked.
https://www.hackread.com/brazzers-hacked-80k-accounts-leaked/
● Luabot Malware Turning Linux Based IoT Devices into DDoS Botnet.
The IT security researchers at MalwareMustDie have discovered a malware that is
capable of infecting Linux-based Internet of Things (IoT) devices and web servers to
launch DDoS (Distributed Denial of Service) attacks.
https://www.hackread.com/luabot-malware-ddos-linux-iot-devices/
Power Shell on Linux -Open Source
To Read more about and find the refered links this Blogpost can help you,
This post containes all the important links listed as in,
http://www.hanselman.com/blog/AnnouncingPowerShellOnLinuxPowerShe
llIsOpenSource.aspx
This Project is posted in Github as well:-
https://github.com/PowerShell/PowerShell
Official Page for Power Shell.
http://microsoft.com/powershell
Python tips and tricks :
what not to do when writing secure python code:-
1) https://access.redhat.com/blogs/766093/posts/2592591
2) https://pythontips.com/
Bits for Coders and Programmers:-
Interesting Password Reset Exploit :-
OpenCFP is an open source conference talk submission system written in PHP. It is
used by lots of conferences, including for example Immunity’s Infiltrate conference and
others. This is a short write-up of a bug that I found while auditing OpenCFP, although
the issue actually resides in a third-party auth framework used by OpenCFP called
Sentry which is developed by Cartalyst. Despite being deprecated, Sentry appears to be
quite popular so this bug is very likely to affect a number of other applications too.
http://haxx.ml/post/149975211631/how-i-hacked-your-cfp-and-probably-some-other
Most Important - Tips About Working in #Infosec
There Is this one common problem that is being faced by the beginners that :
1) From Where to Start ?
2) How to Start ?
3) With what to start with ?
4)What all things are needed to start ?
5) Are Certification important to start with ?
6) Do we need “Money” to start ?
In Short that most of us have searched on Google this thing..
“ How to Become a HACKER ? ”
So for this problem we have a simple solution to practice with.
Here, are some Blogs that might help you to understand in more depth about the issue that
you are facing and what best solution you can get from these blogposts or from
Null_Meet_up as well.
● https://lcamtuf.blogspot.in/2016/08/so-you-want-to-work-in-security-but-are.html
● https://medium.freecodecamp.com/so-you-want-to-work-in-security-bc6c10157d23
References
➢ Twitter
➢ Whatsapp Groups
➢ HackerNews.com
➢ Vogh.com
➢ HackerRead.com

More Related Content

What's hot

Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismRichard Stiennon
 
Internet hacked google search
Internet hacked   google searchInternet hacked   google search
Internet hacked google searchGordon Kraft
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515lisawhipp
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!InnoTech
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhandenullowaspmumbai
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 
Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskarnullowaspmumbai
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceZubair Baig
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware TrojanMalware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware TrojanCyphort
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyaniyanizaki
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkJack Shaffer
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionMohammad Yahya
 
Biggest Data Breaches of 2013
Biggest Data Breaches of 2013Biggest Data Breaches of 2013
Biggest Data Breaches of 2013Mihajlo Prerad
 

What's hot (20)

Post Apocalyptic Cyber Realism
Post Apocalyptic Cyber RealismPost Apocalyptic Cyber Realism
Post Apocalyptic Cyber Realism
 
Internet hacked google search
Internet hacked   google searchInternet hacked   google search
Internet hacked google search
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
 
Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!Social and Mobile and Cloud OH MY!
Social and Mobile and Cloud OH MY!
 
Null mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya JamkhandeNull mumbai Session on ransomware by_Aditya Jamkhande
Null mumbai Session on ransomware by_Aditya Jamkhande
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
Null mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul TulaskarNull mumbai news bytes by Rahul Tulaskar
Null mumbai news bytes by Rahul Tulaskar
 
Ransomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion MenaceRansomware: Emergence of the Cyber-Extortion Menace
Ransomware: Emergence of the Cyber-Extortion Menace
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Ransomware
RansomwareRansomware
Ransomware
 
Newbytes NullHyd
Newbytes NullHydNewbytes NullHyd
Newbytes NullHyd
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware TrojanMalware's Most Wanted: CryptoLocker—The Ransomware Trojan
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
 
Hacking
HackingHacking
Hacking
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Hackers
HackersHackers
Hackers
 
Biggest Data Breaches of 2013
Biggest Data Breaches of 2013Biggest Data Breaches of 2013
Biggest Data Breaches of 2013
 

Similar to News Bytes by Jaskaran Narula - Null Meet Bhopal

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017chauhananand17
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manualRoel Palmaers
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in MaySathish Kumar K
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Your money or your files
Your money or your filesYour money or your files
Your money or your filesRoel Palmaers
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud ComputingMitesh Katira
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatRobert Leong
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 

Similar to News Bytes by Jaskaran Narula - Null Meet Bhopal (20)

NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work NetworkPrivate Date and PRYING Eyes - Talking Cybersecurity at After Work Network
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
 
News Bytes - December 2015
News Bytes - December 2015News Bytes - December 2015
News Bytes - December 2015
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Cyber war
Cyber warCyber war
Cyber war
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
cyber attacks in May , breaches in May
cyber attacks in May , breaches in Maycyber attacks in May , breaches in May
cyber attacks in May , breaches in May
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Hamza
HamzaHamza
Hamza
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeat
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 

Recently uploaded

IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 

Recently uploaded (20)

IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 

News Bytes by Jaskaran Narula - Null Meet Bhopal

  • 1. NEWS BYTES By Jaskaran Singh Narula
  • 2. About Me:- 1)Blogger on www.deltaheads.com 2)Information Security Enthusiast 3)Computer Networking Geek 4) Sad but True I am an Engineer. Follow me on twitter @JaskaranNarula
  • 3. Major Hacks of the Month ● NSA Got HAcked --- What When how Who and why??. ● PIL Filed Against Pokemon Go In India for hurting relegious sentiments. ● USB KILL to destory pc in Secounds. ● ’Alarming' rise in Ransomwares Attacks. ● Customs Services of Ukraine Government Hacked By Anonymous, 1 GB of Classified Data Stolen.
  • 4. NSA Got Hacked !! What? When?How?Who and Why?? The Shadow brokers Demanded for around 1Million Bitcoins nearly around $568Million dollars. Although news over the web is the hack was never proven actually, Files were realised on "Github" but were down in a mater of time because of the company policies, which says they can keep "Stealed" products on the platform.
  • 5. Exploits by Shadow Brokers Here are some latest Exploits by this hacking group, moreover this group has released the tools on “Github” after the NSA Hacking case happened. Here is the link to view there exploits in details https://www.exploit-db.com/author/?a=8712
  • 6. PIL Filed Against Pokemon Go In India for hurting Relegious Sentiments. A Gujarat resident, Alay Anil Dave has recently filed a Public Interest Litigation (PIL) in the Gujarat High Court against Niantic, developers of Pokémon Go, over allegations that the game is hurting religious sentiments of Hindus and Jains by showing virtual eggs in places of worship of different religious groups. This game is reported to have almost as many daily active users on Twitter. And Due to this ban on Pokemon many Third Party Apps are Released which resemble to the game but are actually for the purpose for Hacking your Cell phone Popularly Know as “Pokemon Go Ransomware”.
  • 7. USB KILL to Destroy Computers in “Seconds”. ● As the company explains, when plugged in, the USB Kill 2.0 stick rapidly charges its capacitors via the USB power supply, and then discharges – all in a matter of seconds. ● The USB stick discharges 200 volts DC power over the data lines of the host machine and this charge-and-discharge cycle is repeated several numbers of times in just one second, until the USB Kill stick is removed.
  • 8. ‘Alarming’ rise in Ransomwares Attacks A Canadian university has paid hackers to restore access to data they had turned into the digital equivalent of gibberish. The University of Calgary transferred 20,000 Canadian dollars-worth of bitcoins ($15,780; £10,840) after it was unable to unwind damage caused by a type of attack known as ransomware.The malware caused emails and other files to become encrypted.
  • 9. Customs Services of Ukraine Government Hacked By Anonymous, 1 GB of Classified Data Stolen. ● Anonymous Hacker Group now Targeted Ukraine Government, hacked there "DataBase" and Stole of Over 1GB of Classified Data from There Severs. ● During this round of cyber attack the main target was the Customs department of Ukraine. In their press release Anonymous took responsibility of performing onerous attack on CUSTOMS.GOV.UA also. ● In This Cyber Attack many Gov Documents were hacked from the server and were made public of the Ukraine, All these paper revealed the scams of corruption cases running internally in the gov. Said by Anonymous.
  • 10. Interesting Bits ● Brazzers.com got Hacked Exposes 800,000 email IDs and Password. After Brazzers got hacked, AshleyMadison.com, a Canadian dating website, was also hacked by a vigilante hacking group. During that attack, more than 37 million user accounts’ details were leaked. https://www.hackread.com/brazzers-hacked-80k-accounts-leaked/ ● Luabot Malware Turning Linux Based IoT Devices into DDoS Botnet. The IT security researchers at MalwareMustDie have discovered a malware that is capable of infecting Linux-based Internet of Things (IoT) devices and web servers to launch DDoS (Distributed Denial of Service) attacks. https://www.hackread.com/luabot-malware-ddos-linux-iot-devices/
  • 11. Power Shell on Linux -Open Source To Read more about and find the refered links this Blogpost can help you, This post containes all the important links listed as in, http://www.hanselman.com/blog/AnnouncingPowerShellOnLinuxPowerShe llIsOpenSource.aspx This Project is posted in Github as well:- https://github.com/PowerShell/PowerShell Official Page for Power Shell. http://microsoft.com/powershell
  • 12. Python tips and tricks : what not to do when writing secure python code:- 1) https://access.redhat.com/blogs/766093/posts/2592591 2) https://pythontips.com/ Bits for Coders and Programmers:- Interesting Password Reset Exploit :- OpenCFP is an open source conference talk submission system written in PHP. It is used by lots of conferences, including for example Immunity’s Infiltrate conference and others. This is a short write-up of a bug that I found while auditing OpenCFP, although the issue actually resides in a third-party auth framework used by OpenCFP called Sentry which is developed by Cartalyst. Despite being deprecated, Sentry appears to be quite popular so this bug is very likely to affect a number of other applications too. http://haxx.ml/post/149975211631/how-i-hacked-your-cfp-and-probably-some-other
  • 13. Most Important - Tips About Working in #Infosec There Is this one common problem that is being faced by the beginners that : 1) From Where to Start ? 2) How to Start ? 3) With what to start with ? 4)What all things are needed to start ? 5) Are Certification important to start with ? 6) Do we need “Money” to start ? In Short that most of us have searched on Google this thing.. “ How to Become a HACKER ? ” So for this problem we have a simple solution to practice with. Here, are some Blogs that might help you to understand in more depth about the issue that you are facing and what best solution you can get from these blogposts or from Null_Meet_up as well. ● https://lcamtuf.blogspot.in/2016/08/so-you-want-to-work-in-security-but-are.html ● https://medium.freecodecamp.com/so-you-want-to-work-in-security-bc6c10157d23
  • 14. References ➢ Twitter ➢ Whatsapp Groups ➢ HackerNews.com ➢ Vogh.com ➢ HackerRead.com