EastWind New Cyber-Attack Hits Russian Government Bodies and IT Firms This involves distributing the spear-phishing emails that are used to deliver various backdoors and trojans. The attack chains start with RAR ...
By
The Cloud Security Alliance’s “Top Threats to Cloud Computing 2024” report shows that problems like misconfigurations, identity and access management (IAM) vulnerabilities, and insecure APIs ...
By
Google has released its August security patch for Android, which fixes 46 bugs. One bug stands out as dangerous: CVE-2024-36971. This high-risk flaw affects Android’s networking ...
By
Recently, Apple boasted a new update to the macOS operating system known as Sequoia. The update contains new changes to the Gatekeeper security feature, which ...
By
Cybersecurity researchers have found a new phishing scam. This scam uses Google Drawings and WhatsApp-generated short links to get around security and trick users into ...
By
A major security flaw has come to light for RISC-V processors with the discovery of a new hardware vulnerability called “GhostWrite.” Researchers from CISPA Helmholtz Center for Information Security showed ...
By
Researchers have discovered a dangerous new way to exploit vulnerabilities in the Linux operating system called SLUBStick. This technique can transform minor software flaws into ...
By
Vulnerability Threatens harms A major security bug nicknamed “0.0.0.0 Day” by Oligo Security researchers has left web browsers like Chrome, Safari, and Firefox open to ...
By
Cybersecurity researchers have found several new malware families that use the Microsoft Graph API’s legitimate cloud services for command-and-control operations. This tactic allows threat actors ...
By
Experts in cybersecurity have found security flaws in Roundcube webmail software. These flaws might let attackers run malicious JavaScript in the victim’s web browsers and steal sensitive information from their account ...
By