Description Hackers are utilizing BYOF (Bring Your Own Filesystem) assaults to take advantage of the open-source Linux PRoot utility and offer a con . . . Read more
Description Three vulnerabilities were found and reported in American Megatrends MegaRAC Baseboard Management Controller (BMC) firmware that puts ma . . . Read more
Description Some new malicious android apps were recently discovered to have infiltrated Google Play store, infecting devices with malware, adware a . . . Read more
Description Googles Threat Analysis group (TAG) has recently linked a commercial surveillance company to an exploit framework that targets zero . . . Read more
Description The Quarkus Java framework has been found to have a serious security flaw that might be used to execute remote code on vulnerable system . . . Read more
Description A recent discovery from the cyber security firm JFrog related that an unexpected behaviour in npms Command Line Interface (CLI) can lead . . . Read more
Description Multiple laptop models were affected by a high-severity vulnerability patched by Acer that would have allowed local attackers to disable . . . Read more
Description Google Ads are being used by a growing threat activity cluster in one of its attempts to disseminate numerous post-compromise payloads, i . . . Read more
Description A recent data leak was revealed when an unknown user was allegedly selling nearly 500 million WhatsApp users phone numbers on the dark w . . . Read more
Description Hackers started a spear phishing attempt to spread personalized malware stored in Google Drive to international governmental, academic, . . . Read more
Description A recently discovered evasive malware forces the Secure Shell (SSH) cryptographic protocol to enter targeted systems with the goal of car . . . Read more
Description A new malicious campaign has compromised over 15,000 WordPress websites to redirect visitors to bogus Q&A portals. Summary The . . . Read more