Microsoft’s security researchers have uncovered a critical vulnerability in macOS. It enables hackers with root privileges to bypass System Integrity Protection (SIP). By exploiting…
Vulnerabilities
Vidar Stealer: The Little Dragon of Internet
Vidar stealer is malicious software that steals information from computers under infection. It leverages popular social media platforms. These platforms include TikTok, Telegram, Steam,…
Neopets Data Breach Exposes Personal Data of 69 Million Members
According to one security expert, e-commerce websites generally struggle to keep their sites secure and frequently include weak code from supply-chain partners or third…
$100 million cryptocurrency was stolen from the Blockchain company Harmony on Thursday evening
The company informed about the incident to the authorities; the FBI investigated the cyber attack taking the help of many cyber security firms. Harmony’s…
Hacker exploits a zero-day vulnerability in Mitel VoIP
A ransomware attack against an unnamed target used Mitel VoIP equipment as an entry point to execute the code remotely and access the environment. …
Magecraft campaign sheds light on the scale of the ongoing campaign
A Magecart skimming campaign, recently discovered, was traced back to an earlier attack in November 2021. Two malware domains have been tracked for hosting…
WordPress sites updated automatically to fix a critical Plugin flaw
WordPress websites using a popular plugin named Ninha Forums have been automatically updated to fix a critical flaw, and the flaw has been widely…
A Microsoft Office 365 feature can help Ransomware hackers to hack Cloud files
A “dangerous piece of functionality” has been uncovered in Microsoft 365 suite that can be exploited by attackers to ransom files stored on SharePoint…
Vulnerabilities plaguing Mitel IP phones
Cybersecurity researchers have shared details of two medium-security vulnerabilities in Mitel 6800/6900 desk phones, and if the vulnerabilities are successfully exploited, the attackers can…
Researchers identify flaws in Carrier’s Industrial Access Control System
At least 8 vulnerabilities have been discovered in Carrier’s LenelS2 HID Mercury access control system; The system is prevalent in healthcare, education, transportation and…