Attackers can exploit a previously unknown security vulnerability in the Kubernetes container engine CRI-O labelled cr8escape. The attacker can exploit the vulnerability to escape…
Suryash Kumar
Latest posts - Page 8
Several flaws detected in the ClickHouse OLAP database system
Researchers have found seven new security vulnerabilities in an open-source database management system solution called ClickHouse. The vulnerabilities could be exploited to strike the…
Software development and in-security go together
Checkmarx rolled out its UK report; the report states around 45% of organisations had to put up with at least two security breaches because…
Emotnet Trojan resurrected, and it’s causing havoc
Emotnet trojan, one of the most infamous malware campaigns, has rekindled and is causing more damage than ever. In January 2021, law enforcement authorities…
New method circumvents Spectre-V2 mitigation in Intel, AMD processors
A new method to evade hardware mitigations in AMD, Intel, and Arm processors has been discovered by researchers. The processors can be subject to…
DDOs Threat actor targets website with 2.5 million requests
Attackers are relentlessly attacking targets with ransom notes and manipulating the stock price of targeted companies. These notes were part of a string_of_text directed…
A raft of APC Smart-UPS devices vulnerable to attacks
Armis researchers have found three vulnerabilities in APC Smart-UPS devices; they call the vulnerabilities collectively TLStorm. APC stated it had sold more than 20…
Amazon’s Echo smart speakers can be hacked to issue self-commands
Academic researchers have uncovered a vulnerability in Amazon Echo smart speakers, which can be used to hack it. The hacker can use the speaker…
SharkBot malware spreading through fake antivirus app on Google Play store
Threat actors have used antivirus as their banking trojan cover to avoid detection by Google Play. The banking trojan is called SharkBot. SharkBot, similar…
RuRAT campaign using innovative methods to get inside the system
RuRAT malware is being installed as part of a malicious drive; the malware allows remote access to affected devices. The attackers are masking as…