CISA has newly issued an ICS (Industrial Control Systems) advisory for a ThroughTek device P2P vulnerability that could allow malicious entities unauthorized access to…
General
Alibaba-Owned Taobao Shopping Site Data Leak Of 1.1.B User Pieces
Alibaba-owned Taobao Chinese shopping platform faced a massive data leak where 1.1 Billion pieces of data were breached with a malicious actor using web-crawling…
Facebook Messenger Bug Could Compromise Facebook User Private Data
Details of the Facebook Messenger vulnerability were discussed in a proof-of-concept where it was observed that a user’s Facebook account could be hacked using…
Samsung Pre-Installed Apps Found With Several Critical Bugs
In the latest developments, Samsung has been found with numerous security flaws in their pre-installed apps that could compromise private user data. Security vulnerabilities…
Google Chrome Zero-Day Patched in Chrome Update
In the newest Google Chrome Zero-Day developments, the web browsing giant has rolled out a security update for yet another zero-day vulnerability that was…
Polkit Affecting Easy-To-Exploit Linux Vulnerability Found By GitHub
In the latest developments, GitHub has newly reported an easy-to-exploit Linux security flaw that can be potentially exploited to escalate to root on the…
Nordlocker Research Found New Nameless Malware
In the latest developments, Nordlocker security researchers have found that an unnamed malware has compromised more than 3.2 million PCs and stole a whopping…
Joomla Combined Vulnerabilities Can Critically Compromise Networks
In the latest developments, security experts have detected two vulnerabilities within Joomla CMS that can be exploited to critically target and attack a network…
Microsoft Patch Tuesday- June 2021 Patches 6 Zero-days
Microsoft has addressed several security flaws in this month’s Microsoft Patch Tuesday and comes with security patches for a total of six zero-day vulnerabilities…
STUN Servers Exploited For DDoS Attacks; NETSCOUT Research
Security researchers have newly discovered that STUN servers are being rapidly exploited for DDoS attacks, thereby making thousands of STUN servers vulnerable to such…