How Secure Is Wi-Fi In General
Since we now live in times where virtually everything is online, the matter of our personal security becomes more important than ever. But with fast and easy access to the internet, that’s literally at...
Beware of Fake Google Chrome Update Pop-Ups that Installs Malware
In the ever-changing cybersecurity landscape, a persistent threat appears in the form of a fake Chrome update.
Usually, these efforts involve injecting harmful code into a website, which prompts individuals to update their web browsers...
First Ever SaaS Ransomware Attack Leveraged SharePoint Online
The Obsidian cybersecurity firm has recently documented a successful ransomware attack targeting Sharepoint Online (Microsoft 365).
The hackers stealthily exploited a Microsoft Global SaaS admin account in a departure from the standard compromised endpoint route.
The...
Tor Browser 13.0 Released: What’s New
Tor Browser 13.0.14 has been released, bringing essential security updates to the popular privacy-focused web browser.
This latest version includes updates to the underlying Firefox browser and several bug fixes and improvements.
Critical Updates in Tor...
When Security Solutions Fail: How Can Continuous Security Validation Help Teams?
Companies that have financial resources to allocate toward cybersecurity are hacked every day.
In January, there was a Royal Mail ransomware attack that halted international shipments for weeks.
In February, Coinbase suffered a data breach following...
CWE Version 4.14 Released : What’s New!
The Common Weakness Enumeration (CWE) project, a community-developed list of common software and hardware weakness types, has announced the release of version 4.14.
This latest version introduces significant updates and improvements, including new entries and...
Weaponized Telegram App Infected Over 60K Android Users
Telegram Messenger offers global, cloud-based instant messaging with several features:-
Optional end-to-end-encryption
Video calling
VoIP
File sharing
Cybersecurity researchers at Securlist recently found several Telegram mods on Google Play in various languages (traditional Chinese, simplified Chinese, and Uighur), claiming...
Lambda Layers Code Execution Flaw Leads To Supply Chain On AI/ML Applications
A new supply-chain vulnerability has been identified in the Lambda Layers of third-party TensorFlow-based Keras models. This vulnerability could allow threat actors to inject arbitrary code into any AI/ML application.
Any Lambda Layers that were...
Beware of New Android Trojan That Executes Malicious Commands on Your Phone
Cybersecurity researchers at XLab have uncovered a new Android malware strain called "Wpeeper."
This sophisticated backdoor Trojan has been designed to infiltrate Android systems and execute a wide range of malicious commands, posing a significant...
APT Group Attacks Indian Defense Units and Armed Forces Since 2019 Aimed to Steal...
The intelligence and security reports have claimed that since 2019 the APT group was exploiting the Indian defense unit and Armed forces to steal sensitive information.
The security firm, Seqrite has disclosed this attack,...