Description Three high-impact UEFI security vulnerabilities have been discovered in multiple Lenovo consumer laptop models, allowing malicious actor . . . Read more
Description Microsoft addressed a security hole in the Windows Print Spooler component in February, but it is still being actively abused in the wild . . . Read more
Description The public disclosure of a new zero-day vulnerability in the Nginx web server affecting the LDAP-auth reference implementation, which all . . . Read more
Description An Android spyware application has been discovered that poses as a Process Manager service to capture sensitive data from infected devic . . . Read more
Description A new phishing technique known as the browser-in-the-browser (BitB) attack can be used to mimic a valid site by simulating a browser win . . . Read more
Description A new variant of the JSSLoader remote access malware is being propagated using malicious Microsoft Excel addins, according to researchers . . . Read more
Description BitRAT, a malware classified as a Remote Access Trojan (RAT) is being distributed to users looking to activate pirated Windows Operating . . . Read more
Description Researchers at Microsoft on Wednesday 16th March have reported a new technique being used by the TrickBot malware. This new technique use . . . Read more
Description Researchers have discovered a new botnet in active development that aims to entangle Linux systems into an army of bots ready to steal sen . . . Read more
Description BazarLoader, a stealth and advanced malware that is used as a first-stage infector, is being propagated through a novel social engineering . . . Read more
Description A local attacker could use a newly discovered security vulnerability in the Linux kernel to gain elevated privileges on susceptible system . . . Read more
Description Three high-impact security vulnerabilities have been discovered in APC Smart-UPS systems, which might be exploited as a physical weapon by . . . Read more