Qualcomm’s Bold Move: Intel Acquisition Bid Faces Antitrust Hurdle
Earlier reports suggested that Qualcomm, a major chip design company, has shown significant interest in Intel’s chip design division and may be considering an acquisition of Intel’s PC processor...
View ArticleWordPress Theme ‘Houzez’ and Associated Plugin Vulnerabilities Expose...
Two critical vulnerabilities have been discovered in the widely-used WordPress theme Houzez and its companion plugin Houzez Login Register. With over 46,000 sales, Houzez is a popular choice for...
View ArticleBingX Suffers $44 Million Cyberattack, Highlighting Web3 Security Concerns
Singapore-based cryptocurrency exchange BingX has reported a significant cyberattack resulting in the loss of over $44 million in digital assets. The incident, which was detected last week following...
View ArticleNew Necro Trojan Targets Over 11 Million Android Devices Through Google Play...
In a concerning development for Android users, Kaspersky Labs has uncovered a new version of the Necro Trojan, a multi-stage malware loader capable of infecting millions of devices. This latest... The...
View ArticleCVE-2024-8956 (CVSS 9.1): PTZOptics Cameras Vulnerable to Remote Attacks
A recently disclosed security flaw, CVE-2024-8956, poses a significant risk to users of certain PTZ cameras, including popular models from PTZOptics. This vulnerability, rated CVSS 9.1, opens the door...
View ArticleENISA Calls for Urgent Action as EU Cyberattacks Reach Record High
The European Union is grappling with an unprecedented wave of cyberattacks, according to the latest “ENISA Threat Landscape 2024” report by the European Union Agency for Cybersecurity (ENISA). Covering...
View ArticleInformation Stealer Alert: Lumma Strikes Again with Go-Based Injector
Recently, the eSentire Threat Response Unit (TRU) discovered a concerning new malware delivery chain involving a Go-based Injector that ultimately led to the execution of Lumma Stealer, a well-known...
View ArticleCVE-2024-47062 (CVSS 9.4): Flaws Discovered in Navidrome Music Server Expose...
In a newly published security advisory, several critical vulnerabilities have been identified in Navidrome, a popular open-source music streaming server. These flaws, disclosed under CVE-2024-47062...
View ArticleCVE-2024-38286: Denial-of-Service Vulnerability Discovered in Apache Tomcat
The Apache Software Foundation has issued a security advisory for a newly discovered vulnerability in Apache Tomcat that could allow attackers to execute a denial-of-service (DoS) attack. Identified as...
View ArticleCVE-2024-9043 (CVSS 9.8): Cellopoint Secure Email Gateway Flaw Puts Sensitive...
A recently disclosed vulnerability (CVE-2024-9043) in Cellopoint’s Secure Email Gateway (SEG) could expose enterprise email systems to critical security risks, making it an urgent matter for...
View ArticleResearcher Details CVE-2024-20439 (CVSS 9.8) Flaw in Cisco Smart Licensing...
In a recent cybersecurity revelation, Nicholas Starke, a threat researcher at Aruba, a Hewlett Packard Enterprise company, unveiled the details of CVE-2024-20439, a severe vulnerability affecting...
View ArticleSevere Unauthenticated RCE Flaw (CVSS 9.9) in GNU/Linux Systems Awaiting Full...
A critical security vulnerability affecting all GNU/Linux systems—and potentially others—has been identified by renowned security researcher Simone Margaritelli. The vulnerability, which allows for...
View ArticleCISA Warns of Actively Exploited Ivanti vTM Flaw CVE-2024-7593 (CVSS 9.8),...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory regarding an actively exploited security vulnerability impacting Ivanti Virtual Traffic Manager (vTM), a...
View ArticleRansomHub’s EDR-Killer: How Zerologon and EDRKillShifter Exploit Networks...
In a recently uncovered report by Trend Micro, the notorious RansomHub ransomware group has been found to leverage a powerful new tool, EDRKillShifter, to disable endpoint detection and response...
View ArticleCompromised Credentials: New Cyberattack Exploits Industry Email Accounts
Proofpoint researchers have uncovered a campaign targeting transport and logistics companies across North America. These attackers are leveraging compromised email accounts from legitimate firms in the...
View Article30 Exploitable Flaws: Alarming Study on Home Router Defaults
A study titled “Exposed by Default: A Security Analysis of Home Router Default Settings” has shed light on the pervasive vulnerabilities present in home routers, highlighting significant risks...
View ArticleRussian Hackers Target Mobile Devices in New Espionage Wave
Cybersecurity researcher BushidoToken’s latest report reveals a disturbing trend: Russian state-backed hackers are increasingly focusing on mobile devices, exploiting them for espionage, stealing...
View ArticleVulnerabilities Found in Proroute H685t-w 4G Router: Command Injection and...
Security researchers have disclosed two critical vulnerabilities in Proroute H685t-w 4G routers that could allow remote attackers to compromise affected devices, potentially leading to unauthorized...
View ArticleResearchers Exploit Vulnerability to Obtain TLS Certificates for Any .MOBI...
A significant security flaw has been uncovered by researchers from WatchTowr, allowing them to obtain Transport Layer Security (TLS) certificates for any .MOBI domain. This exploit raises serious...
View ArticleInfostealers Overcome Chrome’s App-Bound Encryption, Threatening User Data...
In a concerning development for cybersecurity, developers of several notorious infostealers have announced that they have successfully bypassed Chrome’s App-Bound Encryption feature introduced in...
View Article