A year after potential candidates looking for work on LinkedIn were tempted with weaponized job offers, a new series of phishing assaults carrying the…
General
Java encryption implementation error made it trivial to forge credentials
A critical flaw in the Java JDK’s handling of some encryption procedures makes it simple for attackers to create fake credentials. Oracle resolved the…
Android devices vulnerable to remote spying as flaws discovered in chipsets
Audio decoders of Qualcomm and Media Tek chips have been found to have three security vulnerabilities, and if the vulnerabilities are left unpatched, it…
Improved Evasion Tactics in a New SolarMarker Variant
An improved version of the SolarMarker malware has been described in detail by researchers. Improvements have been made, as well as new defence evasion…
Windows Print Spooler flaw exploited in the wild
The U.S Cybersecurity and Infrastructure Security Agency (CISA) has asked users to watch out for a vulnerability in the Windows Print Spooler. Although Microsoft…
Leading the Next Waves of Botnet Attacks: Enemybot and Fodcha
Two botnets have been trying to infect people all over the world by exploiting flaws in modems, routers, and IoT devices. These botnets, which…
ZingoStealer by Hasker Gang emerges as a serious threat
ZingoStealer, a malware that steals data, has been tracked, and the malware has potent features that can steal data and load additional payloads. Further,…
Attackers can take control of Aethon TUG Hospital Robots due to five flaws in JekyllBot
Aethon Tug hospital robots have been patched for at least five security flaws that might allow remote attackers to take control of the devices…
McDonald’s Warns Customers of the Data Breach in Costa Rica
McDonald’s customers in Costa Rica have been notified of a data breach in which their personal information was obtained. Client names, marital status, address,…
Elementor, a WordPress website builder plugin, plagued with a vulnerability
Elementor, a WordPress website builder plugin that has more than five million active installations, has a vulnerability that can lead to authenticated remote code…