General Security News
-
MMRat Android Trojan Executes Remote Financial Fraud Through Accessibility Feature
A previously undocumented Android banking trojan dubbed MMRat has been observed targeting mobile users in Southeast Asia since late June 2023 to...
-
China-Linked BadBazaar Android Spyware Targeting Signal and Telegram Users
Cybersecurity researchers have discovered malicious Android apps for Signal and Telegram distributed via the Google Play Store and Samsung Galaxy...
-
Hackers Abuse Azure AD Abandoned Reply URLs to Escalate Privilege
Recent reports indicate that there has been a privilege escalation vulnerability discovered, which arises due to abandoned Active Directory URLs....
-
Hackers Can Exploit Skype Vulnerability to Find User IP Address
Hackers can now capture your IP address and expose your physical location by sending a Skype link, even if you don’t click it. An IP address,...
-
Mom’s Meals Breached: Over 1.2 Million Consumers Data Exposed
PurFoods, LLC, operating under the trade name Mom’s Meals, has announced the compromise of personal information affecting its clients and...
-
Critical Vulnerability Alert: VMware Aria Operations Networks at Risk from Remote Attacks
VMware has released software updates to correct two security vulnerabilities in Aria Operations for Networks that could be potentially exploited to...
-
FBI Dismantles QakBot Malware, Frees 700,000 Computers, Seizes $8.6 Million
A coordinated law enforcement effort codenamed Operation Duck Hunt has felled QakBot, a notorious Windows malware family that's estimated to have...
-
Chinese Hacking Group Exploits Barracuda Zero-Day to Target Government, Military, and Telecom
A suspected Chinese-nexus hacking group exploited a recently disclosed zero-day flaw in Barracuda Networks Email Security Gateway (ESG) appliances...
-
Microsoft Edge Privilege Escalation Flaw – Update Now!
Microsoft Edge has published a release note that mentioned a Privilege escalation vulnerability with the CVE ID of CVE-2023-36741 and has a CVSS...
-
Hackers Embed Weaponized Word File into a PDF to Evade Detection
To avoid detection, hackers employed a new method dubbed “MalDoc in PDF” to insert a malicious Word file into a PDF file. Despite having magic...
-
Lockbit 3.0 Builder Leaked: Anyone Can Blend Ransomware
It has come to the attention of researchers that the LockBit 3.0 builder has suffered from a leak, which now allows anyone to create various...
-
Phishing-as-a-Service Gets Smarter: Microsoft Sounds Alarm on AiTM Attacks
Microsoft is warning of an increase in adversary-in-the-middle (AiTM) phishing techniques, which are being propagated as part of the...