Google Pixel Phones Exposed: Millions at Risk Due to Pre-Installed App...
Cybersecurity researchers at iVerify, in collaboration with Palantir Technologies and Trail of Bits, have uncovered a significant vulnerability in millions of Google Pixel devices worldwide. The flaw,...
View ArticleSave uBlock Origin: How to Bypass Google’s Chrome Update and Extend Support
Google Chrome has begun automatically detecting and warning users on the extensions page that Manifest v2-based extensions are nearing deprecation. Although these extensions have not yet been fully...
View ArticleWindows Sandbox Gets Supercharged: Clipboard and File Sharing Arrive
Microsoft continues to refine its Windows 11 experience with the introduction of significant updates to the Windows Sandbox application in the latest Windows 11 Canary Build 27686. Designed as a... The...
View ArticleWPS Office Vulnerabilities Expose 200 Million Users: CVE-2024-7262 Exploited...
WPS Office, a widely used office suite with a user base exceeding 200 million, has been found to contain two critical vulnerabilities that could expose users to remote code execution... The post WPS...
View ArticleZDI Details Copy2Pwn: Zero-Day CVE-2024-38213 Evades Windows Security Measures
Researchers at Trend Micro’s Zero Day Initiative (ZDI) published the technical details for a vulnerability in Windows, identified as CVE-2024-38213, which has exposed a critical flaw in the operating...
View ArticleWindows 11 24H2: Microsoft Enforces Device Encryption by Default
The device encryption feature in Windows 10/11 was originally an optional function, with some OEMs enabling it on laptops and other devices to enhance security. Device encryption is based on... The...
View ArticleTusk Campaign: Russian Cybercriminals Target Gaming & Crypto
Kaspersky Lab has uncovered an international cyber campaign targeting the theft of cryptocurrency and personal data from Windows and macOS users worldwide. The campaign has been named “Tusk.” The...
View ArticleIranian APT42 Ramps Up Phishing Campaigns Against Israel, U.S. Election Targets
Google’s Threat Analysis Group (TAG) has issued a warning about APT42, an Iranian government-backed threat actor, and their escalating phishing campaigns aimed at high-profile individuals and...
View ArticleGoogle Products Exploited in Sophisticated Malvertising Scheme
Cybersecurity researchers at Malwarebytes Labs have uncovered a sophisticated malvertising campaign targeting Google users. The scammers have brazenly impersonated Google’s entire product line, using...
View ArticleCybercriminals Evolve Social Engineering Tactics, Exploit CVE-2022-26923 in...
Recently, cybersecurity firm Rapid7 identified a series of sophisticated intrusion attempts linked to an ongoing social engineering campaign that has been actively monitored by its threat intelligence...
View ArticleEDRKillShifter: A New EDR-Killing Tool in Ransomware Attack
Sophos researchers have discovered a new threat: EDRKillShifter, a sophisticated tool designed to dismantle endpoint detection and response (EDR) systems, the very software designed to thwart...
View ArticleValleyRAT Campaign Leverages Shellcode and Social Engineering to Target...
In a recent discovery by FortiGuard Labs, an ongoing cyber campaign has been identified, aggressively deploying the ValleyRAT malware to target Chinese-speaking users. The campaign has a particular...
View ArticleCrowdSec: The Next-Generation Behavior Detection Engine for Enhanced...
In today’s rapidly evolving digital landscape, securing network infrastructures has never been more critical. With the rise of cloud computing, containerization, and virtual machine (VM)-based...
View Article10,000+ WordPress Sites at Risk: Critical File Deletion Flaw Found in InPost...
A critical vulnerability, tracked as CVE-2024-6500 (CVSS 10), has been uncovered in two popular WordPress plugins, InPost PL and InPost for WooCommerce, leaving over 10,000 websites susceptible to...
View ArticleCyclops: Iranian APT 35 Hackers’ Latest Tool for Network Infiltration
Researchers have uncovered a new piece of malware named Cyclops, likely developed by the “Charming Kitten” group (APT 35). This malware first emerged in December 2023 and by 2024 had... The post...
View ArticleGafgyt Botnet: Now Exploiting GPU Power in Cloud-Native Environments
Researchers at Aqua Nautilus have identified a new variant of the Gafgyt botnet that represents a significant evolution in malware targeting strategies. Originally known for infecting IoT devices to...
View ArticleShimano Di2 Wireless Protocol: Critical Vulnerabilities Uncovered
Researchers from the University of California, San Diego, and Northeastern University have uncovered a potential vulnerability in wireless gear-shifting tools used by professional cyclists. This flaw...
View ArticleBANSHEE Stealer: $3,000/Month macOS Malware Targets Apple Users
Security researchers warn of a new macOS malware, BANSHEE Stealer, which has recently emerged in underground forums. Developed by Russian threat actors and introduced on an underground forum, this...
View ArticleCloud Attack: Extortionists Breach AWS, Expose 90,000 Variables
Palo Alto Networks has uncovered a large-scale ransomware campaign that has impacted over 100,000 domains. The perpetrators exploited misconfigured ENV files in AWS to gain access to data stored in......
View ArticleRansomware Attacks Surge: $459 Million Paid in First Half of 2024
According to a new report, ransomware victims paid over $459 million to attackers in the first half of 2024. This staggering figure underscores the escalating cybersecurity crisis affecting...
View Article