Google interceded to eliminate nine downloaded Android applications more than 5.8 multiple times from the organization’s Play Store after the applications were found stealthily…
JavaScript
Cisco ASA Vulnerability Exploited After PoC Was Made Public
A formerly patched Cisco ASA security vulnerability is being actively exploited by threat actors after its exploit PoC was posted on Twitter. The Cisco…
Chrome’s 7th Zero-Day of 2021 Patched by Google in Update
Google has newly pushed Chrome’s zero-day update for Windows, Linux, and Mac systems to patch up four security vulnerabilities, with one of them being…
Google Chrome Zero-Day Patched in Chrome Update
In the newest Google Chrome Zero-Day developments, the web browsing giant has rolled out a security update for yet another zero-day vulnerability that was…
Necro Python Malware Upgrading To Cryptominer Abilities; Cisco Talos Research
In the latest malware developments, the Necro Python malware has been found to be developing new and malicious capabilities, thereby intensifying its cyber threat.…
Chrome 91 Updates Addresses 32 Vulnerabilities
Google on May 25th announced the release of Chrome 91 to the stable channel. The latest update patches a total of 32 vulnerabilities. Chrome…
Scheme Flooding: Flaw That Surpasses Tor, Chrome, Safari, and more
Security researchers have newly discovered a critical vulnerability dubbed as scheme flooding that can facilitate bypassing privacy layers that are persistent in all major…
Foxit Reader Patched for Critical RCE Bug Hackable By Malicious PDFs
In the latest vulnerability developments, Foxit has released security fixes for a Remote Code Execution(RCE) bug in its PDF reader. Tracked as CVE-2021-21822, it…
Huawei AppGallery brimming with Joker Android Malware; Over 500,000 Users Impacted
Researchers have newly discovered that more than 500,000 Huawei users have been victimized by the Joker Android malware by infesting its official AppGallery. Mal-abilities…
Linux Bugs enable hackers to bypass Spectre attack mitigations
On Monday, cybersecurity specialists revealed two new vulnerabilities in the operating system of Linux that, if effectively abused, could allow assailants to go around…