Resecurity: Insecurity of 3rd-parties leads to Aadhaar data leaks in India

Data leaks containing Aadhaar IDs in India were caused by the insecurity of 3rd parties while aggregating such information for KYC. According to Resecurity, a global cybersecurity provider protecting Fortune 500 companies and governments globally, one of the key issues leading to data leaks containing Aadhaar IDs in India is the insecurity of 3rd parties […]

The post Resecurity: Insecurity of 3rd-parties leads to Aadhaar data leaks in India appeared first on Security Affairs.

November 2, 2023
Read More >>

Who is behind the Mozi Botnet kill switch?

Researchers speculate that the recent shutdown of the Mozi botnet was the response of its authors to the pressure from Chinese law enforcement. ESET researchers speculate that the recent shutdown of the Mozi botnet was the result of its operators’ choice, possibly due to pressure from Chinese authorities. Mozi is an IoT botnet that borrows the […]

The post Who is behind the Mozi Botnet kill switch? appeared first on Security Affairs.

November 2, 2023
Read More >>

Uncovering Prolific Puma, Massive Domain Generator & URL Shortener

Hackers can exploit Massive Domain Generator and URL Shortener services by creating large numbers of deceptive or malicious domains and using URL shorteners to hide the true destination of links.  This can be used for the following illicit purposes:-  Recently, cybersecurity analysts at Infoblox uncovered a massive domain generator and URL shortener service dubbed “Prolific […]

The post Uncovering Prolific Puma, Massive Domain Generator & URL Shortener appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

November 2, 2023
Read More >>