Researchers from cybersecurity firm Abnormal Security observed threat actors spreading the BazarLoader/BazarBackdoor malware via website contact forms rather than typical phishing emails to evade…
General
Attackers Crash Remote Servers with New Infinite Loop Bug in OpenSSL
The maintainers of OpenSSL have dispatched patches to resolve a high-severity security flaw in its software library that could lead to a denial-of-service (DoS)…
Several flaws detected in the ClickHouse OLAP database system
Researchers have found seven new security vulnerabilities in an open-source database management system solution called ClickHouse. The vulnerabilities could be exploited to strike the…
Software development and in-security go together
Checkmarx rolled out its UK report; the report states around 45% of organisations had to put up with at least two security breaches because…
Emotnet Trojan resurrected, and it’s causing havoc
Emotnet trojan, one of the most infamous malware campaigns, has rekindled and is causing more damage than ever. In January 2021, law enforcement authorities…
New Security Vulnerability Affects Thousands of GitLab Instances
Researchers have disclosed details of a now-patched security vulnerability in GitLab, an open-source DevOps software, that could potentially allow a remote, unauthenticated attacker to…
Hackers Leaked DLSS Source Code Online Who Broke Into NVIDIA’s Network
NVIDIA an American chipmaking company, on Tuesday confirmed that its network was breached as a result of a cyber attack, enabling the perpetrators to…
Cybersecurity Bill to Strengthen Critical Infrastructure Security Passed by Senate of United States.
The U.S. Senate unanimously passed the “Strengthening American Cybersecurity Act” on Tuesday in an attempt to bolster the cybersecurity of critical infrastructure owners in…
Again The TeaBot Trojan Haunts Through Google Play Store
Malicious Google Play apps have circumvented censorship by hiding trojans in software updates.The TeaBot banking trojan – also known as Anatsa – has been…
New method circumvents Spectre-V2 mitigation in Intel, AMD processors
A new method to evade hardware mitigations in AMD, Intel, and Arm processors has been discovered by researchers. The processors can be subject to…