Software Searches Lead to FakeBat Malware Infections

Software Searches Lead to FakeBat Malware Infections

FakeBat Loader Fuels Increase in Cyber Attacks Cybersecurity researchers have recently observed a spike in malware infections attributed to malvertising campaigns. These attacks deploy a malicious loader known as FakeBat, which has become increasingly prevalent. You might be interested in:…


0 Comments4 Minutes

Google Pixel Devices Shipped with Security Flaw

Google Pixel Devices Shipped with Security Flaw

Since September 2017, a notable number of Google Pixel devices around the world have had dormant software that could potentially be misused for harmful purposes, including the installation of various antivirus programs. You might be interested in: Microsoft Fixes 90 Vulnerabilities, Including 6…


0 Comments5 Minutes

Urgent Patch: Windows IPv6 RCE Risk

Urgent Patch: Windows IPv6 RCE Risk

Serious Security Flaw in Windows Systems On Tuesday, Microsoft issued a strong warning to its users, urging them to apply a critical security update to address a severe vulnerability in the TCP/IP stack that could allow remote code execution (RCE). This flaw impacts all Windows computers that have…


0 Comments5 Minutes

FBI Takes Down Radar/Dispossessor Servers Globally

FBI Takes Down Radar/Dispossessor Servers Globally

The FBI recently announced a significant operation that successfully dismantled the web infrastructure of a new ransomware group known as Radar/Dispossessor. Operation Details This operation led to the takedown of several key elements of the group’s infrastructure. The FBI disabled three servers in…


1 Comment6 Minutes

Microsoft Vulnerabilities have been fixed: 90 and 6 Zero-Days

Microsoft Fixes 90 Vulnerabilities, Including 6 Zero-Days

Microsoft Releases Security Updates Addressing 90 Vulnerabilities, Including 6 Zero-Days Microsoft has issued security updates addressing 90 vulnerabilities, including 10 classified as zero-day vulnerabilities. Notably, 6 of these zero-day vulnerabilities have already been exploited in active…


0 Comments5 Minutes

Browser Vulnerability Hits MacOS & Linux

Browser Vulnerability Hits MacOS & Linux

A New Threat in Cybersecurity Cybersecurity researchers have discovered a new vulnerability known as “0.0.0.0 Day,” which poses a serious risk to all major web browsers. This flaw allows malicious websites to potentially gain access to local networks, putting sensitive data at risk.…


0 Comments4 Minutes

Phishing Attack Uses Google & WhatsApp Links

Phishing Attack Uses Google & WhatsApp Links

Overview of the Threat Cybersecurity experts have recently identified a novel phishing campaign that cleverly exploits Google Drawings and WhatsApp-generated shortened URLs to deceive users into handing over sensitive personal information. This new tactic highlights the ever-evolving nature of…


0 Comments4 Minutes

Hackers Exploit Roundcube Webmail Flaws

Hackers Exploit Roundcube Webmail Flaws

Security Concerns in Roundcube Webmail Security experts have discovered several vulnerabilities in the Roundcube webmail program that could allow attackers to inject malicious JavaScript into a user’s browser, leading to the theft of sensitive data from their account. You might be…


0 Comments4 Minutes

Major Vulnerability in Rockwell Devices

Major Vulnerability in Rockwell Devices

Overview of the Vulnerability A significant security flaw has been identified in Rockwell Automation’s ControlLogix 1756 devices, which could allow unauthorized access to system programming and configuration via the common industrial protocol (CIP). This vulnerability, labeled CVE-2024-6242,…


0 Comments4 Minutes

Google Chrome's Latest Security for Cookies

Google Chrome’s Latest Security for Cookies

New Challenges for Attackers In a recent update, Chrome has introduced a new security measure that complicates life for attackers. “Since the app-bound service operates with system-level privileges, hackers now need more than just a malicious app to infiltrate a system,” explained…


0 Comments3 Minutes