Blog Series
security vulnerabilites
Nexx smart home devices vulnerable...
A handful of faults in Nexx’s smart home gadgets that hackers can exploit are estimated to put over 40,000 residential and commercial premises at danger. This allows them to unlock...
Several Use After Free Linux...
Recently, the Linux kernel was found to have several critical flaws. Memory exhaustion, system crashes, denial of service (DoS), the disclosure of private data, cross-site scripting (XSS) attacks, privilege escalation...
WordPress websites compromised in Balad...
A persistent effort that targets “all known and recently discovered theme and plugin vulnerabilities” has hacked an estimated one million WordPress websites according to Sucuri. Researchers have called the campaign...
Supply chain attack on 3CX...
Two security companies have detected a supply chain attack on 3CX, a popular communication software provider. The malware has infected the Windows Electron client, but only for customers who have...
CISA orders Federal agencies to...
The Cybersecurity and Infrastructure Security Agency (CISA) has directed government agencies to address security flaws used in zero-day attacks during recent incidents in which commercial spyware was installed on mobile...
AlienFox toolset used to steal...
A new modular toolkit, AlienFox, allows malicious actors to harvest credentials from multiple cloud service providers, according to SentinelLabs. The toolset is available for sale and primarily distributed on Telegram...
Multiple malware bothers targets Cacti...
Experts in cybersecurity have lately identified a significant increase in the activity of botnets that propagate malware and attack vulnerable network devices. These assaults transmit the ShellBot and Moobot malware...
Researchers uncovers critical vulnerabilities in...
Security researchers from cybersecurity firm Wiz have uncovered a new type of attack that enables hackers to bypass authentication and take over user accounts in various Microsoft applications. The research...
Hackers evolves techniques needed to...
According to a recent campaign by Earth Preta, nation-state hackers aligned with China are becoming increasingly adept at circumventing security solutions. The threat actor has been active since at least...
Tesla, Microsoft Teams, others hacked...
On the second day of Pwn2Own Vancouver 2023, a group of security researchers exploited ten zero-day vulnerabilities in various products, earning $475,000 in total. The Tesla Model 3, Microsoft’s Teams...
Former TikTok employee claims company’s...
A former TikTok risk manager has met with congressional investigators to express his concerns that the company’s plan for protecting user data in the United States is deeply flawed, pointing...