ClickCease security vulnerabilites Archives - Page 12 of 22 - TuxCare

Linux malware infects 70,000...

A stealthy Linux malware called AVrecon has been used to infect over 70,000 Linux-based small office/home office (SOHO) routers, according to a report by Lumen’s Black Lotus Labs threat research...

Zimbra warns of critical zero-day...

Zimbra has warned of a critical zero-day security flaw in its email software that has been actively exploited in the wild. The vulnerability, which has been assigned the CVE identifier...

Microsoft discloses espionage attempt by...

Microsoft has revealed that a China-based hacking group, dubbed Storm-0558 was behind the calculated attempt to infiltrate email systems for intelligence collection purposes. The group breached email accounts of approximately...

SonicWall issues patch for vulnerabilities...

SonicWall has issued an urgent patch for critical vulnerabilities in its Global Management System (GMS) and Analytics network reporting engine software suites after they were discovered by the NCC Group....

Meduza malware targets browsers, password...

A new malware dubbed Meduza Stealer has been discovered to be targeting Windows operating systems, and identified as a stealer of information from a large number of browsers, password managers,...

StackRot Vulnerability in Linux Kernel...

A new vulnerability, called StackRot, was discovered by a security researcher, Ruihan Li, in the Linux kernel’s memory management subsystem. The incorrect lock handling for accessing and updating virtual memory...

Inky uncovers malicious QR codes...

According to Inky Technology Corp., image-based emails with integrated Quick Response (QR) codes are being used in phishing attacks. To fool receivers more readily and collect critical information, the attackers...

Samsung smartphones affected by six...

Six vulnerabilities affecting Samsung mobile devices have been added to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities Catalogue. Samsung addressed all of the vulnerabilities in 2021,...

MITRE reveals 25 most dangerous...

MITRE has announced its list of the top 25 most dangerous software vulnerabilities that have afflicted the industry over the last two years, after rigorously evaluating and scoring each weakness...

RDStealer used to steal data...

A cyberespionage campaign called RedClouds is using malware called RDStealer to steal data from drives shared through Remote Desktop connections. The campaign has been targeting systems in East Asia since...

Abandoned S3 buckets used to...

Cybersecurity researchers at Checkmarx have warned that abandoned Amazon Simple Storage Service (S3) buckets can be used to spread malware. It all started with an NPM package named “bignum” that...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter