Police arrested a 19-year-old Tennessee man for stalking his partner using an Apple watch attached to the wheel of the partner’s car. According to…
Suryash Kumar
Latest posts - Page 7
SQL injection protection in ImpressCMS could be evaded to execute RCE
Vulnerabilities found in ImpressCMS can allow an unauthorised attacker to circumvent the software’s SQL injection safeguards to execute codes remotely or Remote code execution…
Vmware Horizon servers continue to be exploited through log4j vulnerability
Attackers continue to target VMware Horizon servers, which many organizations use to securely access enterprise apps for remote workers. Attackers are exploiting the critical…
Malware affects computers with cryptocurrency miners
An unknown threat actor has been employing a “ complex and powerful” malware loader for deploying cryptocurrency miners on affected systems and possibly allowing…
FataIRAT’s new variant used by Purple Fox malware operators
Purple Fox malware operators have expanded their malware arsenal and now possess a new variant of a remote access trojan FataIRAT. Further, at the…
Attacks targeting Android and iPhone users for stealing cryptocurrency uncovered
Researchers have uncovered a malicious scheme mainly directed towards Chinese users via fake apps on Android and iOS that resemble genuine digital wallet services…
Azure developers targeted by more than 200 NPM malicious packages
A new massive supply chain attack targeting Azure developers for stealing personal information has deployed more than 218 malicious NPM packages. “After manually inspecting…
Botnet Malware jeopardises over 2,00,000 Mikro Tik routers
Mikro Tik’s vulnerable routers have been used in one of the largest botnet-as-a-service cybercrime, according to cybersecurity researchers. Avast published a new piece of…
Dell BIOS bugs impact millions of Inspiron, Vostro, XPS, Alienware systems.
Five new vulnerabilities have been found in Dell BIOS; if the vulnerabilities are successfully exploited, the systems can have codes executed remotely. The Dell…
iPhone feature being used in “CryptoRom” scam
Social engineering attacks have been using romantic traps and cryptocurrency tricks to lure victims into installing duplicate apps. These attacks use legitimate iOS features…