RFID Cards Hacked: Hotels, Offices at Risk

RFID Cards Hacked: Hotels, Offices at Risk

Hidden Vulnerability in FM11RF08S Cards A recent discovery in the cybersecurity field has revealed a hidden backdoor in certain MIFARE Classic contactless cards, specifically within a model known as FM11RF08S. This backdoor could allow unauthorized access, making it possible to bypass…


0 Comments4 Minutes

Google Fixes Critical Chrome Security Issue

Google Fixes Critical Chrome Security Issue

Overview of the Security Flaw Google has released critical security updates to fix a serious vulnerability in its Chrome browser. This flaw, which has been actively exploited, affects the V8 JavaScript and WebAssembly engine. The vulnerability, identified as CVE-2024-7971, is a type…


0 Comments4 Minutes

PHP Exploit Leads to Msupedge Backdoor Attack

PHP Exploit Leads to Msupedge Backdoor Attack

A New Backdoor Emerges in Cybersecurity A recent cyberattack targeting an unidentified university in Taiwan has brought to light a previously unknown backdoor named Msupedge. According to a report from the Symantec Threat Hunter Team, part of Broadcom, this backdoor has never been documented…


0 Comments5 Minutes

Software Searches Lead to FakeBat Malware Infections

Software Searches Lead to FakeBat Malware Infections

FakeBat Loader Fuels Increase in Cyber Attacks Cybersecurity researchers have recently observed a spike in malware infections attributed to malvertising campaigns. These attacks deploy a malicious loader known as FakeBat, which has become increasingly prevalent. You might be interested in:…


0 Comments4 Minutes

Google Pixel Devices Shipped with Security Flaw

Google Pixel Devices Shipped with Security Flaw

Since September 2017, a notable number of Google Pixel devices around the world have had dormant software that could potentially be misused for harmful purposes, including the installation of various antivirus programs. You might be interested in: Microsoft Fixes 90 Vulnerabilities, Including 6…


0 Comments5 Minutes

Urgent Patch: Windows IPv6 RCE Risk

Urgent Patch: Windows IPv6 RCE Risk

Serious Security Flaw in Windows Systems On Tuesday, Microsoft issued a strong warning to its users, urging them to apply a critical security update to address a severe vulnerability in the TCP/IP stack that could allow remote code execution (RCE). This flaw impacts all Windows computers that have…


0 Comments5 Minutes

FBI Takes Down Radar/Dispossessor Servers Globally

FBI Takes Down Radar/Dispossessor Servers Globally

The FBI recently announced a significant operation that successfully dismantled the web infrastructure of a new ransomware group known as Radar/Dispossessor. Operation Details This operation led to the takedown of several key elements of the group’s infrastructure. The FBI disabled three servers in…


1 Comment6 Minutes

Microsoft Vulnerabilities have been fixed: 90 and 6 Zero-Days

Microsoft Fixes 90 Vulnerabilities, Including 6 Zero-Days

Microsoft Releases Security Updates Addressing 90 Vulnerabilities, Including 6 Zero-Days Microsoft has issued security updates addressing 90 vulnerabilities, including 10 classified as zero-day vulnerabilities. Notably, 6 of these zero-day vulnerabilities have already been exploited in active…


0 Comments5 Minutes

Browser Vulnerability Hits MacOS & Linux

Browser Vulnerability Hits MacOS & Linux

A New Threat in Cybersecurity Cybersecurity researchers have discovered a new vulnerability known as “0.0.0.0 Day,” which poses a serious risk to all major web browsers. This flaw allows malicious websites to potentially gain access to local networks, putting sensitive data at risk.…


0 Comments4 Minutes

Phishing Attack Uses Google & WhatsApp Links

Phishing Attack Uses Google & WhatsApp Links

Overview of the Threat Cybersecurity experts have recently identified a novel phishing campaign that cleverly exploits Google Drawings and WhatsApp-generated shortened URLs to deceive users into handing over sensitive personal information. This new tactic highlights the ever-evolving nature of…


0 Comments4 Minutes