The Linux Mint OS users are recommended by developers to update their system versions to their latest ones for important security measures. Linux Mint…
Cybersecurity
Node.js Package Library Patches Severe Command Injection Vulnerability
Popular Node.js package library systeminformation has recently patched a severe command injection vulnerability in the repository that could have left applications jeopardized. Systeminformation is…
Recent Ransomware Attack Hits Dutch Funding Organization (NWO)
The Dutch Organization for Scientific Research (NWO) was recently subjected to a ransomware attack where hackers published a database of internal records of the…
Twitter “Safety Mode” to Release Soon | Twitter Safety Mode Trending
In an Analyst day presentation, Twitter has reported introducing a new feature called the ‘safety mode’ feature and is trending widely. As Twitter is…
T-Mobile Data Breach Undermines User Data After Sim Swapping Attack
Mobile telecommunications organization T-mobile has recently reported a data breach incident since an undisclosed number of customers were found to be impacted by SIM…
Firefox Extension Attack by Chinese Hackers Targeting Tibetans
Alleged reports have registered that a certain Chinese Communist Party-supported Chinese hacker group has been snooping on Tibetan activists by deploying a Firefox malware…
Phishing Attacks Defraud 10,000 FedEx and DHS Express Targets
FedEx and DHL Express have recently been subjected to large-scale phishing attacks, with a combined 10,000 victims targeted, in the favor of poaching the…
Cisco Recognizes & Resolves Major Authority Bypass Vulnerability in MSO
In an advisory released on Wednesday, Cisco declared that they have addressed a maximum severity bypass vulnerability, tracked as CVE-2021-1388 having a 10/10CVSS base…
Cashalo Data Breach, Hackers Strikes on Filipino Cash Loan App
Filipino online cash loan app Cashalo victimized in a data breach attack that entailed database records being peddled on the dark web. Detected by…
Chinese ‘Jian’ Attack Tool Cloned from an NSA owned tool & exploited for years
This week started with appalling news when the security firm Check Point on Monday confirmed that they’ve found evidence to prove that the hacking…