Category: EN

Microsoft Fixes Nine Zero-Days on Patch Tuesday

Microsoft’s August Patch Tuesday saw the tech giant address nine zero-day vulnerabilities This article has been indexed from www.infosecurity-magazine.com Read the original article: Microsoft Fixes Nine Zero-Days on Patch Tuesday

Clickbait PDFs, An Entry point For Multiple Web Based Attacks

Researchers studied the infrastructure behind clickbait PDF attacks by analyzing a large dataset of real-world PDFs to identify clickbait ones and their linked infrastructure and found that attackers use various hosting types, including object storage, website hosting, and CDNs.  The…

Exploiting pfsense Flaw for Remote Code Execution

During a recent security audit by Laburity researchers, an application with a vulnerability related to pfblockerNG was identified. Attempts using default credentials failed, but an exploit from exploit-db was unsuccessful. This article has been indexed from Cyware News – Latest…

Zoom Fixes Critical Vulnerabilities Allowing Privilege Escalation

Zoom Video Communications has recently disclosed several critical vulnerabilities affecting its Workplace Apps, SDKs, and Rooms Clients. These vulnerabilities, identified in multiple security bulletins, pose significant risks, potentially allowing attackers to escalate privileges on affected systems. The issues impact users…

Malware Loaders Dominate Cybersecurity Threats in 2024

Malware loaders are a significant threat in the cybersecurity landscape, with nearly 40% of all malware observed in critical security incidents involving these specialized tools. Among the most prevalent loaders are “SocGholish,” “GootLoader,” and “Raspberry Robin,” which have been frequently…

Can Hackers Track Down a User Based on Google Maps Usage?

In an age where digital privacy concerns are at an all-time high, the potential for hackers to track users through their Google Maps usage raises significant alarm. Google Maps, a widely-used navigation tool, provides invaluable convenience in everyday life, but…