General Security News
-
Hackers Trick Users With Data Leak Message to Deploy Malware
Researchers discovered the spread of a malicious exe file that targets specific individuals and is disguised as information related to a personal...
-
Hackers Spy iPhone Users Using Malicious Keyboard Apps
A new method of keylogging using malicious keyboard apps has been discovered to affect iPhones, evading all Apple’s security detection procedures....
-
MrAnon Stealer Attacking Windows Users Via Weaponized PDF Files
Phishing emails targeting Windows users were discovered, tricking users into opening a malicious PDF file called “MrAnon Stealer” that spreads...
-
Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws
Apple on Monday released security patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari web browser to address multiple security flaws, in...
-
New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now
Apache has released a security advisory warning of a critical security flaw in the Struts 2 open-source web application framework that could result...
-
Researchers Unmask Sandman APT's Hidden Link to China-Based KEYPLUG Backdoor
Tactical and targeting overlaps have been discovered between the enigmatic advanced persistent threat (APT) called Sandman and a China-based threat...
-
Researchers Uncovered an Active Directory DNS spoofing exploit
In the intricate web of our interconnected world, the Domain Name System (DNS) stands as a linchpin, directing users to their online destinations....
-
WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack
A critical remote code execution vulnerability has been patched as part of the WordPress 6.4.2 version. This vulnerability exists in the POP...
-
Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts
Hackers target email accounts because they contain valuable personal and financial information. Successful email breaches enable threat actors...
-
SpyLoan Scandal: 18 Malicious Loan Apps Defraud Millions of Android Users
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded over...
-
New PoolParty Process Injection Techniques Outsmart Top EDR Solutions
A new collection of eight process injection techniques, collectively dubbed PoolParty, could be exploited to achieve code execution in Windows...
-
SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs
Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to leak sensitive...