Access of the identity board supplier SecureAuth has revealed a vulnerability in the security in the memory database of SAP HANA software, SAP. The…
open source software
OpenEMR fixes Security Vulnerabilities For Better Service
Vulnerabilities have been discovered recently in the popular medical records management portal, OpenEMR. These vulnerabilities if left unattended would have renowned the medical practice…
Akira Ransomware Takes Aim at Cisco VPNs to Infiltrate Organizations
A recent surge in evidence indicates that Akira, a relatively new strain of ransomware, is leveraging vulnerabilities in Cisco VPN products. This attack method…
The Exploitation of Corporate Credentials: A Warning for Businesses
There’s an alarming rise in the theft of corporate credentials, with a recent analysis revealing that over 400,000 such credentials have been stolen by…
New Android GravityRAT Malware Targets WhatsApp Backups
A recent surge in Android malware activity has unveiled a fresh wave of GravityRAT attacks. Since August 2022, mobile devices have been infected with…
Pirated Windows 10 ISOs Conceal Clipper Malware through EFI Partitions
Cybercriminals are utilizing torrents to distribute pirated versions of Windows 10 that hide cryptocurrency hijackers within the EFI (Extensible Firmware Interface) partitions. This technique…
Over 60,000 Android Apps Discovered Secretly Installing Adware for Six Months
In a startling revelation, Romanian cybersecurity firm Bitdefender has uncover a massive adware campaign. It has gone undetected for the past six months. The…
ChatGPT Data Breach – Vulnerability Threats
OpenAI’s chatbot, ChatGPT, which gained widespread popularity upon its release in late 2022, has been hacked revealing critical cyber-security vulnerabilities. This ChatGPT data breach…
Emotet Malware Targets US Taxpayers with Phishing Campaign
Emotet malware, a notorious infection distributed through phishing emails, is targeting US taxpayers through a new phishing campaign. The campaign is impersonating W-9 tax…
Hackers exploit a flaw in ZK Java Framework RCE -CISA warns
After threat actors started aggressively using the ZK Java Framework remote code execution (RCE) flaw in attacks, the U.S. Cybersecurity & Infrastructure Security Agency…