Google Confirms Active Exploit in Chrome

Google Confirms Active Exploit in Chrome

Critical Exploit in Chrome Patched: Users Urged to Update Security Flaw Exploited in the Wild Google has patched an Exploit in Chrome browser that has been actively exploited by attackers. The flaw, identified as CVE-2024-7965, was part of a recent software update released last week. You might be…


0 Comments3 Minutes

Uber Faces €290M Fine for EU Data Breach

Uber Fined €290 Million by Dutch DPA for Breaching EU Data Protection Laws

Record-Breaking Fine for Data Transfer Violations The Dutch Data Protection Authority (DPA) has imposed a staggering €290 million ($324 million) fine on Uber for failing to comply with the European Union’s (EU) strict data protection rules. The penalty comes after Uber was found guilty of…


0 Comments4 Minutes

RFID Cards Hacked: Hotels, Offices at Risk

RFID Cards Hacked: Hotels, Offices at Risk

Hidden Vulnerability in FM11RF08S Cards A recent discovery in the cybersecurity field has revealed a hidden backdoor in certain MIFARE Classic contactless cards, specifically within a model known as FM11RF08S. This backdoor could allow unauthorized access, making it possible to bypass…


0 Comments4 Minutes

Google Fixes Critical Chrome Security Issue

Google Fixes Critical Chrome Security Issue

Overview of the Security Flaw Google has released critical security updates to fix a serious vulnerability in its Chrome browser. This flaw, which has been actively exploited, affects the V8 JavaScript and WebAssembly engine. The vulnerability, identified as CVE-2024-7971, is a type…


0 Comments4 Minutes

PHP Exploit Leads to Msupedge Backdoor Attack

PHP Exploit Leads to Msupedge Backdoor Attack

A New Backdoor Emerges in Cybersecurity A recent cyberattack targeting an unidentified university in Taiwan has brought to light a previously unknown backdoor named Msupedge. According to a report from the Symantec Threat Hunter Team, part of Broadcom, this backdoor has never been documented…


0 Comments5 Minutes

Software Searches Lead to FakeBat Malware Infections

Software Searches Lead to FakeBat Malware Infections

FakeBat Loader Fuels Increase in Cyber Attacks Cybersecurity researchers have recently observed a spike in malware infections attributed to malvertising campaigns. These attacks deploy a malicious loader known as FakeBat, which has become increasingly prevalent. You might be interested in:…


0 Comments4 Minutes

Google Pixel Devices Shipped with Security Flaw

Google Pixel Devices Shipped with Security Flaw

Since September 2017, a notable number of Google Pixel devices around the world have had dormant software that could potentially be misused for harmful purposes, including the installation of various antivirus programs. You might be interested in: Microsoft Fixes 90 Vulnerabilities, Including 6…


0 Comments5 Minutes

Urgent Patch: Windows IPv6 RCE Risk

Urgent Patch: Windows IPv6 RCE Risk

Serious Security Flaw in Windows Systems On Tuesday, Microsoft issued a strong warning to its users, urging them to apply a critical security update to address a severe vulnerability in the TCP/IP stack that could allow remote code execution (RCE). This flaw impacts all Windows computers that have…


0 Comments5 Minutes

FBI Takes Down Radar/Dispossessor Servers Globally

FBI Takes Down Radar/Dispossessor Servers Globally

The FBI recently announced a significant operation that successfully dismantled the web infrastructure of a new ransomware group known as Radar/Dispossessor. Operation Details This operation led to the takedown of several key elements of the group’s infrastructure. The FBI disabled three servers in…


1 Comment6 Minutes

Microsoft Vulnerabilities have been fixed: 90 and 6 Zero-Days

Microsoft Fixes 90 Vulnerabilities, Including 6 Zero-Days

Microsoft Releases Security Updates Addressing 90 Vulnerabilities, Including 6 Zero-Days Microsoft has issued security updates addressing 90 vulnerabilities, including 10 classified as zero-day vulnerabilities. Notably, 6 of these zero-day vulnerabilities have already been exploited in active…


0 Comments5 Minutes