According to a new Sonatype analysis, supply chain attacks on open-source public repositories have surged by 650 percent in the last year. This may…
JavaScript
Remote Code Execution Security gap fixed by NPM package
An extremely well-known NPM bundle called ‘pac-resolver’ for the JavaScript programming language has been fixed to address a remote code execution gap that could…
GitHub Copilot Code can lead to high level of vulnerabilities
A gathering of analysts has found that generally, 40% of the code created by the GitHub Copilot language model is entirely vulnerable. The artificial…
SAP patches 9 high severity vulnerabilities in its Products
One of the severe vulnerabilities is CVE-2021-33698, an unlimited document transfer upload influencing SAP Business One. As per Onapsis, an organization that has some…
FlyTrap Android Malware Hacks Thousands of FB Accounts
According to a report published today by Zimperium’s zLabs and shared with The Hacker News, the malware, dubbed “FlyTrap,” is believed to be part…
HTML Smuggling used by a week-long campaign of malspam – Microsoft
The Microsoft security group said it distinguished a weeks-in length campaign of email spam violating a method known as “HTML smuggling” to sidestep email…
Phishing fraud BazarBackdoor uses New Deception to defy security
Another obfuscation of phishing fraud campaign has been found conveying the BazarBackdoor malware. The mission is utilizing the multi-pressure technique to cover up the…
RCE Cloudflare CDN vulnerability overall website violation
A Remote Code Execution (RCE) security gap in a Cloudflare content conveyance network administration could permit an assailant to deal with its client’s sites. …
Chrome Browser’s New update with patch up for zero-day bug
An assertion from Google has arrived recognizing that “an abuse for Chrome CVE-2021-30563 exists in the wild” Google has deployed yet another security update…
Credit card details stolen and hidden in images by Magecart hackers
Hackers of the Magecart cybercrime gang have hooked on to another method of jumbling the malware code inside the comment section and encoding robbed…