Writer Profile
Club Member
Connect
I am Garima, an enthusiast who's recently been introduced to the domain of cybersecurity and can't wait to dive into the field. I remember I started writing when I was 9, that's when I wrote my first poem and ever since, I've never stopped. I have only explored more each day with my writing style and the content I work on. I love writing about social issues and fiction. Apart from the time I'm not writing, I'm reading a lot. So, anytime you have a book recommendation, do let me know. Sidelining the geeky part, I watch a lot of thriller and rom-coms(not guilty at all). I also have a varied taste in music, from The Beatles to 5 Seconds of Summer, you'll find me humming to random tunes throughout the day.
VULNERABILITIES
Verifone and Ingenico—security issues and vulnerabilities in POS terminals
4 years ago
Security vulnerabilities were discovered in two leading manufacturers of point-of-sale terminals technology, Verifone and Ingenico, making it open to various cyber-attacks. They were discovered by researcher Aleksei Stennikov and Timur Yunusov, head of offensive security research at Cyber R&D Lab, during a presentation at Black Hat Europe 2020. A point-of-sale... Read more
Security vulnerabilities were discovered in two leading manufacturers of point-of-sale terminals technology, Verifone and Ingenico,... Read more
BREACHES
Gitpaste-12 Worm - Sneaking through the Systems
4 years ago
The Gitpaste-12 worm has been brought into the limelight once again, a few weeks after its discovery in late October by Juniper Threat Labs where it was found targeting Linux based x86 servers, as well as Linux Internet of Things (IoT) devices. This malware has been named so because of... Read more
The Gitpaste-12 worm has been brought into the limelight once again, a few weeks after... Read more
FRAUDS AND SCAMS
WhatsApp Scam: OTP gives hackers access
3 years ago
With over two billion active monthly users, WhatsApp is the most recent target for hackers and scammers. Users are sent scam message through one of their contacts asking them to send a code, i.e., an OTP received in their inbox. It appears like a standard confirmation or verification code but... Read more
With over two billion active monthly users, WhatsApp is the most recent target for hackers... Read more
BREACHES
Data of over 20 million Big Basket Users Leaked
3 years ago
Over the weekend, the personal data of over 20 million Indian users were leaked on a well-known cybercrime forum. The database is said to be of Big Basket users, which the Indian grocery delivery start-up first confirmed on November 7, 2020. The database includes email IDs, home addresses, phone numbers,... Read more
Over the weekend, the personal data of over 20 million Indian users were leaked on... Read more
BREACHES
Domino’s India under fire again—over 18 crore users' data compromised
3 years ago
After a recent series of data breaches, the next company targeted is the renowned pizza delivery chain Domino's India. The sensitive details and information of approximate 18 crore users are available on the dark web. The information leaked includes the name, email, phone number and even the GPS location of... Read more
After a recent series of data breaches, the next company targeted is the renowned pizza... Read more
VULNERABILITIES
Major websites down due to Fastly config error
3 years ago
Thousands of websites, including government portals, news, and social media sites, stopped responding on Tuesday, June 8, 2021, after a massive outage. Other high-traffic sites included Reddit, Amazon, CNN, PayPal, Spotify, Al Jazeera Media Network, and the New York Times also went down owing to the error. They... Read more
Thousands of websites, including government portals, news, and social media sites, stopped responding on Tuesday,... Read more
VULNERABILITIES
Hidden Linux RPM bug discovered after decades
3 years ago
Red Hat has used RPM for software package distribution for decades with no prior known bugs or vulnerability. Now, they have learned the existence of a hidden security bug that has been active since its creation. However, a repair patch has been submitted as soon as it was discovered. ... Read more
Red Hat has used RPM for software package distribution for decades with no prior known... Read more
VULNERABILITIES
'Bad Example' by Accenture for lack of transparency during ransomware attacks
3 years ago
When ransomware and cyber-attacks are at an all-time high, solution providers believe that high profile IT companies such as Accenture could help the industry by disclosing the attack details upfront. Their lack of disclosure is being heavily criticised and is seen as a missed opportunity to keep others well informed.... Read more
When ransomware and cyber-attacks are at an all-time high, solution providers believe that high profile... Read more
VULNERABILITIES
Web Shells and Ransomware transmitted exploiting ProxyShell Vulnerabilities
3 years ago
The Cybersecurity and Infrastructure Security Agency (CISA) has recently warned that various attackers use three so-called “ProxyShell” vulnerabilities to compromise Microsoft Exchange Servers worldwide. They were discovered and demonstrated by Orange Tsai and his fellow research colleagues from DEVCORE Research Team at the Pwn2Own contest and also mentioned at the... Read more
The Cybersecurity and Infrastructure Security Agency (CISA) has recently warned that various attackers use three... Read more
POLICIES AND REGULATIONS
UN Members Seek New Cyber Discussions Amid Rising Ransomware Attacks
3 years ago
Researchers say that although the number of countries responding to the growing number of ransomware attacks, the future of UN-led efforts to create rules about how nations need to behave in cyberspace remains disturbingly unclear. In March, an UN-based cyber discussion group struck an agreement on a set of guidelines... Read more
Researchers say that although the number of countries responding to the growing number of ransomware... Read more
VULNERABILITIES
Known Bug Being Abused by Iranian Hackers Found in Microsoft's MSHTML
3 years ago
Instagram and Google credentials of Farsi-speaking individuals around the world are being stolen by an Iranian threat actor. The threat group is using a new PowerShell-based stealer, PowerShortShell, for this campaign. PowerShortShell is used for Telegram surveillance and gathering system details from infected devices. Attacker-controlled servers work with... Read more
Instagram and Google credentials of Farsi-speaking individuals around the world are being stolen by... Read more
VULNERABILITIES
Log4J—The Latest Cybercrime Storm
3 years ago
Log4j vulnerability has kickstarted a storm in the cyber world. Being famously called "a Fukushima moment for the cybersecurity industry," the security risk is leading to a monumental number of attacks attempting to exploit it. The vulnerability, also known as Log4Shell, was first discovered by LunaSec researchers. Log4Shell is an... Read more
Log4j vulnerability has kickstarted a storm in the cyber world. Being famously called "a Fukushima... Read more