11.6 C
Jaipur
Thursday, January 27, 2022

CATEGORY

Hacking

Multiple Flaws in Control Web Panel Let Attacker Execute Code as Root on Linux Servers

Recently two critical vulnerabilities were detected by the cybersecurity analysts of Octagon Networks in the Control Web Panel (formerly also known as CentOS Web...

Hackers Infect Apple’s macOS by Leveraging a Safari Web Browser Exploit

A never-seen-before malware that is dubbed as “DazzleSpy” has been found in macOS by the cybersecurity researchers at ESET security, leveraging a Safari web...

OpenSubtitles Hacked – Over 7 million Subscribers Data Leaked

On January 18, opensubtitles.org, one of the largest subtitles websites, faced a data breach. OpenSubtitles posted on their forum that they were contacted by...

Emotet Uses Unconventional IP Address Formats to Spread Malware

In a recent ongoing Emotet malware campaign, it has been identified that the threat actors behind this malicious campaign are using the unconventional IP...

Chinese APT Deploys MoonBounce Implant In UEFI Firmware

Kaspersky Lab experts have recently discovered a security vulnerability in UEFI firmware, and this vulnerability was detected while studying the Firmware Scanner logs at...

Spyware Campaign Targeting Enterprises To Steal Corporate Credentials

Several spyware campaigns have been discovered recently by the security researchers at Kaspersky Labs in which the industrial enterprises were targeted by the threat...

Google Details Two Zero-Click Bugs in Zoom Clients

Two zero-click bugs in Zoom clients have been detected recently by the security analyst Natalie Silvanovich of Google’s Project Zero that enables the threat...

25 Windows Policies That Admins Should Not Use in Windows 10 & Windows 11

Microsoft for Windows 10 and Windows 11 has recently listed 25 dead administrative templates (ADMX) policies in which Microsoft has clearly notified the IT...

Cisco StarOS Flaw Let Attackers Gain RCE on Vulnerable Device

Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software had multiple vulnerabilities which could allow an unauthenticated attacker to execute arbitrary commands or disclose...

New Destructive Malware Attack That Wipes Master Boot Records

A destructive malware operation has been detected recently by the security experts at Microsoft Threat Intelligence Center (MSTIC) in which the threat actors are...

Latest news

- Advertisement -