The malicious Joker malware is back with the latest Quick Heal research spotting its presence in a total of 8 Google Play Store apps.…
General
Chrome’s 7th Zero-Day of 2021 Patched by Google in Update
Google has newly pushed Chrome’s zero-day update for Windows, Linux, and Mac systems to patch up four security vulnerabilities, with one of them being…
RedFoxtrot Chinese Group Targets Indian Telecom and Defence Sectors
Recorded Future has newly put forth that a Chinese threat actor, dubbed RedFoxtrot, has been targeting Indian telecom organizations, including BSNL, and other sectors…
CVS Health More Than 1B Records Exposed Online
In the latest developments, CVS Health has faced a massive data leak where over 1billion records belonging to the health organization were found to…
P2P ThroughTek Vulnerability Could Give Camera Feed Access; CISA Warns
CISA has newly issued an ICS (Industrial Control Systems) advisory for a ThroughTek device P2P vulnerability that could allow malicious entities unauthorized access to…
Alibaba-Owned Taobao Shopping Site Data Leak Of 1.1.B User Pieces
Alibaba-owned Taobao Chinese shopping platform faced a massive data leak where 1.1 Billion pieces of data were breached with a malicious actor using web-crawling…
Facebook Messenger Bug Could Compromise Facebook User Private Data
Details of the Facebook Messenger vulnerability were discussed in a proof-of-concept where it was observed that a user’s Facebook account could be hacked using…
Samsung Pre-Installed Apps Found With Several Critical Bugs
In the latest developments, Samsung has been found with numerous security flaws in their pre-installed apps that could compromise private user data. Security vulnerabilities…
Google Chrome Zero-Day Patched in Chrome Update
In the newest Google Chrome Zero-Day developments, the web browsing giant has rolled out a security update for yet another zero-day vulnerability that was…
Polkit Affecting Easy-To-Exploit Linux Vulnerability Found By GitHub
In the latest developments, GitHub has newly reported an easy-to-exploit Linux security flaw that can be potentially exploited to escalate to root on the…