A low-cost Turkish airline unwittingly exposed data of flight crew along with source code and flight data. Early reports say that the exposure happened…
Suryash Kumar
Latest posts - Page 3
Microsoft Office flaw identified by researchers
A zero-day flaw in Microsoft Office has caught the attention of cybersecurity researchers; the flaw can be exploited to execute arbitrary code in affected…
Zyxel releases patches for 4 Flaws
Zyxel has rolled out patches for four security flaws plaguing its firewall, AP Controller, and AP products. The flaw can be exploited to carry…
A surge in ChromeLoader Malware hijacking user’s browsers
A malvertising threat has been rising since its emergence earlier this year. The malware, known as ChromeLoader, is a “pervasive and persistent browser hijacker…
Database containing 142 million customer details of MGM resorts leaked on Telegram
On July 14th, 2020, Hackread.com reported that a hacker with the online handle of NightLion stole various databases from DataViper, a breach observing site.…
IBM helps schools across the globe to build strong cybersecurity defenses
IBM has extended a program that improves cybersecurity defenses of public schools with$5 million in grants. On Tuesday, IBM announced that it would offer…
An unpatched flaw can result in attackers stealing from PayPal users
A security researcher asserts that he has uncovered an unpatched flaw in PayPal’s money transfer service. The flaw can allow attackers to deceive victims…
Microsoft’s report tracks a 254% surge in XorDdos Malware
XorDdos, a Linux botnet malware, has been used extensively—a 254% increase—in the last six months, a Microsoft research reports. The trojan derives its name…
Google’s OAuth client library for Java had a major flaw
Last month Google patched a severe flaw in its OAuth client library for Java; the actors can exploit the flaw by using a compromised…
Microsoft highlights attackers are using fileless methods to persist on SQL servers
On Tuesday, Microsoft warned about a malicious campaign targeting SQL servers that uses a built-in PowerShell binary to persist on affected systems. The intrusions,…