General Security News
-
Samsung Galaxy Store App Found Vulnerable to Sneaky App Installs and Fraud
Two security flaws have been disclosed in Samsung's Galaxy Store app for Android that could be exploited by a local attacker to stealthily install...
-
SaaS Security Posture Management (SSPM) as a Layer in Your Identity Fabric
The move to SaaS and other cloud tools has put an emphasis on Identity & Access Management (IAM). After all, user identity is one of the only...
-
Hackers Actively Exploiting Critical ManageEngine Vulnerability
Rapid7 is taking action in response to several instances of compromise caused by the exploitation of CVE-2022-47966, which is a pre-authentication...
-
PayPal Data Breach – Over 35,000 Users’ Accounts Compromised
PayPal has recently begun sending out notifications to thousands of users who were affected by a data breach. The breach occurred due to...
-
Beware of the New ‘Blank Image’ Attack that Hides Malicious Scripts in Image Files
Avanan researchers have seen a new attack dubbed “Blank Image” spreading throughout the globe wherein hackers include blank images in HTML...
-
Massive Ad Fraud Scheme Targeted Over 11 Million Devices with 1,700 Spoofed Apps
Researchers have shut down an "expansive" ad fraud scheme that spoofed more than 1,700 applications from 120 publishers and impacted roughly 11...
-
Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers' DNS Settings
Threat actors associated with the Roaming Mantis attack campaign have been observed delivering an updated variant of their patent mobile malware...
-
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
The Russian state-sponsored cyber espionage group known as Gamaredon has continued its digital onslaught against Ukraine, with recent attacks...
-
TOP 10 Deep Web Search Engine Alternatives for Google and Bing – 2023
A Deep Web Search Engine is an alternative search engine when we need to search for something, then Google or Bing will be the first choice hit in...
-
Common Browser Security Vulnerabilities Used By Hackers To Take Over Browser
While using web browsers, there are security threats that, if not careful, can allow cybercriminals to take over the browser and steal...
-
Hackers Abuse GitHub Codespaces Feature to Host and Deliver Malware
Trend Micro researchers have recently demonstrated that malware and malicious scripts can be hosted and distributed within GitHub Codespaces by...
-
New Chinese Malware Spotted Exploiting Recent Fortinet Firewall Vulnerability
A suspected China-nexus threat actor exploited a recently patched vulnerability in Fortinet FortiOS SSL-VPN as a zero-day in attacks targeting a...