Security researchers have found a DreamHost cloud database containing more than 800 million records relating to WordPress users that was left exposed online, according…
General
New Crackonosh Crypto-Mining Malware Exploits Windows Safe Mode
Security researchers have recently detected ‘Crackonosh’ which is a new variant of crypto-mining malware that is exploiting the Windows Safe mode. Malicious Crackonosh crypto-mining…
FCUK Fashion Label Victim Of REvil Ransomware
UK-based French Connection clothing retailer i.e FCUK has recently faced a ransomware attack, with links to the infamous REvil ransomware gang. Ransomware attack in…
WD My Book Owners Find All Data Wiped From Devices
In the latest developments, Western Digital’s WD My Book devices have faced an unusual issue where owners of the NAS devices reported that their…
Cl0p Ransomware Continues Operations Even After Being Arrested
A malicious Cl0p ransomware gang has dished out a hoard of stolen data after being arrested in the previous week. Malicious Cl0p ransomware gang:…
NVIDIA Jetson Chips Vulnerable to Critical Attacks; Addressed in June Security Bulletin
NVIDIA Jetson Chips, which are implemented in millions of IoT devices have been detected with numerous security flaws that can lead to critical attacks,…
Fake DarkSide Ransomware Targets Food And Energy Sectors
According to the latest research by Trend Micro, a fake DarkSide ransomware gang has been newly observed to be targeting energy and food sector…
Apple iPhone and iPad WiFi Bug Disrupts WiFi And Other Functionalities
In the newest Apple developments, Apple iPhone and iPad have been found with a new bug that renders the devices’ ability to connect via…
Joker Malware Spotted Again In 8 Google Play Store Apps: Quick Heal
The malicious Joker malware is back with the latest Quick Heal research spotting its presence in a total of 8 Google Play Store apps.…
Chrome’s 7th Zero-Day of 2021 Patched by Google in Update
Google has newly pushed Chrome’s zero-day update for Windows, Linux, and Mac systems to patch up four security vulnerabilities, with one of them being…