A new method to evade hardware mitigations in AMD, Intel, and Arm processors has been discovered by researchers. The processors can be subject to speculative execution attacks like Spectre, resulting in data pilfering from host memory. Spectre and similar attacks…
Latest posts - Page 69
DDOs Threat actor targets website with 2.5 million requests
Attackers are relentlessly attacking targets with ransom notes and manipulating the stock price of targeted companies. These notes were part of a string_of_text directed to CEOs. Recently, a DDoS ransomware threat actor has brought down a single website with up…
A raft of APC Smart-UPS devices vulnerable to attacks
Armis researchers have found three vulnerabilities in APC Smart-UPS devices; they call the vulnerabilities collectively TLStorm. APC stated it had sold more than 20 million UPS devices globally; Armis shared data that points to 80% of companies being vulnerable to…
Amazon’s Echo smart speakers can be hacked to issue self-commands
Academic researchers have uncovered a vulnerability in Amazon Echo smart speakers, which can be used to hack it. The hacker can use the speaker to make unwanted commands like unlock doors, make phone calls and unauthorized purchases, and control furnaces,…
SharkBot malware spreading through fake antivirus app on Google Play store
Threat actors have used antivirus as their banking trojan cover to avoid detection by Google Play. The banking trojan is called SharkBot. SharkBot, similar to other malware TeaBot, FluBot, and Oscorp (UBEL), falls under the financial trojan category. It can…
RuRAT campaign using innovative methods to get inside the system
RuRAT malware is being installed as part of a malicious drive; the malware allows remote access to affected devices. The attackers are masking as a venture capital firm looking to invest money or buy the victim’s site. An IP address…
Unpatched GitLab servers vulnerable
An old vulnerability (CVE-2021-22205) is being actively exploited for controlling on-premise Gitlab servers, Rapid7 researcher Jacob Baines remarks. What makes it worse is at least half of the 60,000 internet-facing GitLab installations the company has identified remains unpatched for the…
Who’s behind the Stalkerware network of compromising several phones?
Developed states are backing spyware that can remotely hack into iPhones. Governments are buying and using these hacking tools to target dissent—journalists, activists and human rights defenders. Another kind of spyware exists that is more relevant and likely to affect…
Google is donating $15 million for the Ukraine crisis and is also targeting Russian media and people
Google said It’s helping those leaving Ukraine- war-affected regions. Google stated that Google.org and Google employees are donating $15 million for relief efforts in Ukraine. The company’s match campaign has got $5 million, and Company gets another $ 5 million…
Pentest as a service Platform: What’s new with Bugdazz 2.0.1?
Pentest as a service platform helps to smoothly manage pentests. Bugdazz 2.0.1 has been released, and it has several improvements over its previous version. The improvements underscore the ease in accessibility for users, and every Bugdazz improvement embodies the customer’s…