Quantcast
Channel: do son, Author at Cybersecurity News
Browsing all 1971 articles
Browse latest View live

Qualcomm’s Bold Move: Intel Acquisition Bid Faces Antitrust Hurdle

Earlier reports suggested that Qualcomm, a major chip design company, has shown significant interest in Intel’s chip design division and may be considering an acquisition of Intel’s PC processor...

View Article


WordPress Theme ‘Houzez’ and Associated Plugin Vulnerabilities Expose...

Two critical vulnerabilities have been discovered in the widely-used WordPress theme Houzez and its companion plugin Houzez Login Register. With over 46,000 sales, Houzez is a popular choice for...

View Article


BingX Suffers $44 Million Cyberattack, Highlighting Web3 Security Concerns

Singapore-based cryptocurrency exchange BingX has reported a significant cyberattack resulting in the loss of over $44 million in digital assets. The incident, which was detected last week following...

View Article

New Necro Trojan Targets Over 11 Million Android Devices Through Google Play...

In a concerning development for Android users, Kaspersky Labs has uncovered a new version of the Necro Trojan, a multi-stage malware loader capable of infecting millions of devices. This latest... The...

View Article

CVE-2024-8956 (CVSS 9.1): PTZOptics Cameras Vulnerable to Remote Attacks

A recently disclosed security flaw, CVE-2024-8956, poses a significant risk to users of certain PTZ cameras, including popular models from PTZOptics. This vulnerability, rated CVSS 9.1, opens the door...

View Article


ENISA Calls for Urgent Action as EU Cyberattacks Reach Record High

The European Union is grappling with an unprecedented wave of cyberattacks, according to the latest “ENISA Threat Landscape 2024” report by the European Union Agency for Cybersecurity (ENISA). Covering...

View Article

Information Stealer Alert: Lumma Strikes Again with Go-Based Injector

Recently, the eSentire Threat Response Unit (TRU) discovered a concerning new malware delivery chain involving a Go-based Injector that ultimately led to the execution of Lumma Stealer, a well-known...

View Article

CVE-2024-47062 (CVSS 9.4): Flaws Discovered in Navidrome Music Server Expose...

In a newly published security advisory, several critical vulnerabilities have been identified in Navidrome, a popular open-source music streaming server. These flaws, disclosed under CVE-2024-47062...

View Article


CVE-2024-38286: Denial-of-Service Vulnerability Discovered in Apache Tomcat

The Apache Software Foundation has issued a security advisory for a newly discovered vulnerability in Apache Tomcat that could allow attackers to execute a denial-of-service (DoS) attack. Identified as...

View Article


CVE-2024-9043 (CVSS 9.8): Cellopoint Secure Email Gateway Flaw Puts Sensitive...

A recently disclosed vulnerability (CVE-2024-9043) in Cellopoint’s Secure Email Gateway (SEG) could expose enterprise email systems to critical security risks, making it an urgent matter for...

View Article

Researcher Details CVE-2024-20439 (CVSS 9.8) Flaw in Cisco Smart Licensing...

In a recent cybersecurity revelation, Nicholas Starke, a threat researcher at Aruba, a Hewlett Packard Enterprise company, unveiled the details of CVE-2024-20439, a severe vulnerability affecting...

View Article

Severe Unauthenticated RCE Flaw (CVSS 9.9) in GNU/Linux Systems Awaiting Full...

A critical security vulnerability affecting all GNU/Linux systems—and potentially others—has been identified by renowned security researcher Simone Margaritelli. The vulnerability, which allows for...

View Article

CISA Warns of Actively Exploited Ivanti vTM Flaw CVE-2024-7593 (CVSS 9.8),...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory regarding an actively exploited security vulnerability impacting Ivanti Virtual Traffic Manager (vTM), a...

View Article


RansomHub’s EDR-Killer: How Zerologon and EDRKillShifter Exploit Networks...

In a recently uncovered report by Trend Micro, the notorious RansomHub ransomware group has been found to leverage a powerful new tool, EDRKillShifter, to disable endpoint detection and response...

View Article

Compromised Credentials: New Cyberattack Exploits Industry Email Accounts

Proofpoint researchers have uncovered a campaign targeting transport and logistics companies across North America. These attackers are leveraging compromised email accounts from legitimate firms in the...

View Article


30 Exploitable Flaws: Alarming Study on Home Router Defaults

A study titled “Exposed by Default: A Security Analysis of Home Router Default Settings” has shed light on the pervasive vulnerabilities present in home routers, highlighting significant risks...

View Article

Russian Hackers Target Mobile Devices in New Espionage Wave

Cybersecurity researcher BushidoToken’s latest report reveals a disturbing trend: Russian state-backed hackers are increasingly focusing on mobile devices, exploiting them for espionage, stealing...

View Article


Vulnerabilities Found in Proroute H685t-w 4G Router: Command Injection and...

Security researchers have disclosed two critical vulnerabilities in Proroute H685t-w 4G routers that could allow remote attackers to compromise affected devices, potentially leading to unauthorized...

View Article

Researchers Exploit Vulnerability to Obtain TLS Certificates for Any .MOBI...

A significant security flaw has been uncovered by researchers from WatchTowr, allowing them to obtain Transport Layer Security (TLS) certificates for any .MOBI domain. This exploit raises serious...

View Article

Infostealers Overcome Chrome’s App-Bound Encryption, Threatening User Data...

In a concerning development for cybersecurity, developers of several notorious infostealers have announced that they have successfully bypassed Chrome’s App-Bound Encryption feature introduced in...

View Article
Browsing all 1971 articles
Browse latest View live