Not all sequels are good! Especially if the sequel is one of the most severe cybersecurity threats of all time. Researchers have recently discovered…
news
Critical Facebook Security: Your calls are being listened to even before you pick them up!
A critical security vulnerability in Facebook has been patched up in their globally installed Messenger application. This enables any remote hacker to make calls…
South Korea threatened by Lazarus group attacking safety of + supply-chain
ESET on Monday confirmed the reports of the Lazarus APT group deploying malware in South Korea. Lazarus, also known as Hidden Cobra is a…
macOS Big Sur launches its first update 11.0.1 that fixes 60 vulnerabilities
Along with the official release of macOS Big Sur 11.0 on the 12th of November, Apple also released its update for the same versioned…
Acute Fissures RCE in Cisco Security Manager
Cisco has posted a couple of safety advisories regarding some major defects in Cisco Security Manager (CSM) a week later the networking device maker…
IoT Botnet Mushtik becomes a threat for Cloud Servers
The ever-strengthening IoT botnet has another threat up their sleeve. It is Mushtik, the 2-year-old botnet that can target cloud infrastructures by wrongfully using…
ENISA releases IoT Security Guidelines for Product Development
A set of IoT Security guidelines was recently released by the European Union Agency for Cybersecurity (ENISA). These guidelines are based on a thorough…
Ubuntu Vulnerabilities discovered that escalate privileges for users
A security researcher at GitHub has reported two Ubuntu Vulnerabilities. These Ubuntu vulnerabilities can help any user gain LPE (Local Privilege Escalation) on the…
Git LFS Vulnerability can give attackers access to Remote Code Execution
Security Researcher Dawid Golunski has discovered a new critical vulnerability in an open-source extension of Git called Git LFS (Large File Storage). Git LFS…
The Government might take stringent measures to ensure user data privacy
The recent Big Basket Data breach has proven to be the last straw for the Indian Government. With multiple data breaches happening on a…