Tag: vulnerability

Urgent: Apple Issues Critical Updates for Actively Expl...

Apple has released security updates to address several security flaws, including...

Critical Jenkins Vulnerability Exposes Servers to RCE A...

The maintainers of the open-source continuous integration/continuous delivery an...

SpectralBlur: New macOS Backdoor Threat from North Kore...

Cybersecurity researchers have discovered a new Apple macOS backdoor called Spec...

Google Cloud Resolves Privilege Escalation Flaw Impacti...

Google Cloud has addressed a medium-severity security flaw in its platform that ...

New Rugmi Malware Loader Surges with Hundreds of Daily ...

A new malware loader is being used by threat actors to deliver a wide range of i...

Iranian Hackers Developed a New Backdoor to Hack Windows

Peach Sandstorm, an Iranian Hackers group, targets diverse sectors globally

Operation RusticWeb: Rust-Based Malware Targets Indian ...

Indian government entities and the defense sector have been targeted by a phishi...

SpyLoan Scandal: 18 Malicious Loan Apps Defraud Million...

Cybersecurity researchers have discovered 18 malicious loan apps for Android on ...

New iPhone Hack Convinces Users With Fake Lockdown Mode

A post-exploitation tampering technique has been discovered that allows the malw...

New 5G Modem Flaws Affect iOS Devices and Android Model...

A collection of security flaws in the firmware implementation of 5G mobile netwo...

Meta Launches Default End-to-End Encryption for Chats a...

Meta has officially begun to roll out support for end-to-end encryption (E2EE) i...

Qualcomm Releases Details on Chip Vulnerabilities Explo...

Chipmaker Qualcomm has released more information about three high-severity secur...

Warning for iPhone Users: Experts Warn of Sneaky Fake L...

A new "post-exploitation tampering technique" can be abused by malicious actors ...

Hackers using Weaponized Office Document to Exploit Win...

A new attack chain campaign has been discovered, which involves the exploitation...

The Importance of Continuous Security Monitoring for a ...

In 2023, the global average cost of a data breach reached $4.45 million. Beyond ...

48 Malicious npm Packages Found Deploying Reverse Shell...

A new set of 48 malicious npm packages have been discovered in the npm repositor...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.