Home Vulnerabilities

Vulnerabilities

Windows 11: Déjà vu all over again?

For longtime Microsoft watchers, there might have been a moment of déjà vu last month as the Redmond, Wash. developer announced its upcoming...

APT Hackers Distributed Android Trojan via Syrian e-Government Portal

An advanced persistent threat (APT) actor has been tracked in a new campaign deploying Android malware via the Syrian e-Government Web Portal, indicating...

A Stealthy Malware Was Found on Hacked Pulse Secure Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released an alert regarding more than a dozen malware samples that were found on exploited...

a New Threat That Steals Credentials in Chrome Recovery Tool

Researchers from ReversingLabs have released a report detailing a threat referred to as NPM malware they found in NPM packages that targets credentials...

MacOS Systems Are Now Targeted by a New XLoader Malware Version

XLoader Malware, a popular virus known for stealing private information from Windows systems has been changed into a new strain, which is capable...

What is a Botnet and How to Prevent Your Devices from Becoming Zombified

When defining what is a botnet, we need to take into consideration that since it’s one of the most sophisticated types of modern malware,...

A Cure for a Disheartened Professional

Data breaches and ransomware attacks aren’t just still occurring. They’re also becoming more frequent. According to ZDNet, the number of ransomware attacks detected...

Questions that help CISOs and boards have each other’s back

Boards of directors and executives seem increasingly interested in understanding their companies’ security posture. And...

Financial services accounting for nearly 40% of all phishing URLs

Vade released its Phishers’ Favorites report for H1 2021, which revealed that there has been...

16-Year-Old HP Printer-Driver Bug Impacts Millions of Windows Machines

An anonymous reader quotes a report from Threatpost: Researchers have released technical details on a high-severity privilege-escalation flaw in HP printer drivers...

Most Read

‘Critical Severity’ Warning for Malware Embedded in Popular JavaScript Library

Security responders are scrambling this weekend to assess the damage from crypto-mining malware embedded in an npm package (JavaScript library) that counts close...

Popular NPM Package Hijacked to Publish Crypto-mining Malware

The U.S. Cybersecurity and Infrastructure Security Agency on Friday warned of crypto-mining malware embedded in "UAParser.js," a popular JavaScript NPM library with over...