Translate

Friday, 30 April 2021

Hackers Exploit SonicWall Zero-Day Bug in FiveHands Ransomware Attacks

An "aggressive" financially motivated threat group tapped into a zero-day flaw in SonicWall VPN appliances prior to it being patched by the company to deploy a new strain of ransomware called FIVEHANDS. The group, tracked by cybersecurity firm Mandiant as UNC2447, took advantage of an "improper SQL command neutralization" flaw in the SSL-VPN SMA100 product (CVE-2021-20016, CVSS score 9.8) that

FBI teams up with ‘Have I Been Pwned’ to alert Emotet victims

The data breach notification site now allows you to check if your login credentials may have been compromised by Emotet

The post FBI teams up with ‘Have I Been Pwned’ to alert Emotet victims appeared first on WeLiveSecurity



Vulnerability In ABUS Secvest Connected Alarms Allowed Remote Disabling

The connected home alarm systems from German security firm ABUS had a serious security issue.…

Vulnerability In ABUS Secvest Connected Alarms Allowed Remote Disabling on Latest Hacking News.



Microsoft Finds 'BadAlloc' Flaws Affecting Wide-Range of IoT and OT Devices

Microsoft researchers on Thursday disclosed two dozen vulnerabilities affecting a wide range of Internet of Things (IoT) and Operational Technology (OT) devices used in industrial, medical, and enterprise networks that could be abused by adversaries to execute arbitrary code and even cause critical systems to crash. "These remote code execution (RCE) vulnerabilities cover more than 25 CVEs and

Here's A New Forum for Cybersecurity Leaders Outside of the Fortune 2000

Perhaps due to the nature of the position, the InfoSec leadership roles tend to be solitary ones. CISOs, or their equivalent decision-makers in organizations without the role, have so many constant drains on their attention – keeping their knowledge fresh, building plans to secure their organizations further – that they often find themselves on an island. It’s even more challenging for

Passwordstate Warns of Ongoing Phishing Attacks Following Data Breach

Click Studios, the Australian software firm which confirmed a supply chain attack affecting its Passwordstate password management application, has warned customers of an ongoing phishing attack by an unknown threat actor. "We have been advised a bad actor has commenced a phishing attack with a small number of customers having received emails requesting urgent action," the company said in an

Thursday, 29 April 2021

Apple AirDrop Vulnerability Exposes Users’ Personal Information – Official Patch Awaited

Apple users relying on the AirDrop feature need to remain cautious while using this feature.…

Apple AirDrop Vulnerability Exposes Users’ Personal Information – Official Patch Awaited on Latest Hacking News.



A New PHP Composer Bug Could Enable Widespread Supply-Chain Attacks

The maintainers of Composer, a package manager for PHP, have shipped an update to address a critical vulnerability that could have allowed an attacker to execute arbitrary commands and "backdoor every PHP package," resulting in a supply-chain attack. Tracked as CVE-2021-29472, the security issue was discovered and reported on April 22 by researchers from SonarSource, following which a hotfix was

LuckyMouse Hackers Target Banks, Companies and Governments in 2020

An adversary known for its watering hole attacks against government entities has been linked to a slew of newly detected intrusions targeting various organizations in Central Asia and the Middle East. The malicious activity, collectively named "EmissarySoldier," has been attributed to a threat actor called LuckyMouse, and is said to have happened in 2020 with the goal of obtaining geopolitical

Prime targets: Governments shouldn’t go it alone on cybersecurity

A year into the pandemic, ESET reveals new research into activities of the LuckyMouse APT group and considers how governments can rise to the cybersecurity challenges of the accelerated shift to digital

The post Prime targets: Governments shouldn’t go it alone on cybersecurity appeared first on WeLiveSecurity



DigitalOcean Data Breach Exposed Customers’ Billing Information

DigitalOCean confirmed the data breach via an email to its customers confirming the exposure of…

DigitalOcean Data Breach Exposed Customers’ Billing Information on Latest Hacking News.



How to Conduct Vulnerability Assessments: An Essential Guide for 2021

Hackers are scanning the internet for weaknesses all the time, and if you don't want your organization to fall victim, you need to be the first to find these weak spots. In other words, you have to adopt a proactive approach to managing your vulnerabilities, and a crucial first step in achieving this is performing a vulnerability assessment. Read this guide to learn how to perform vulnerability

Chinese Hackers Attacking Military Organizations With New Backdoor

Cybersecurity researchers on Wednesday exposed a new cyberespionage campaign targeting military organizations in Southeast Asia. Attributing the attacks to a threat actor dubbed "Naikon APT," cybersecurity firm Bitdefender laid out the ever-changing tactics, techniques, and procedures adopted by the group, including weaving new backdoors named "Nebulae" and "RainyDay" into their data-stealing

Researchers Uncover Stealthy Linux Malware That Went Undetected for 3 Years

A previously undocumented Linux malware with backdoor capabilities has managed to stay under the radar for about three years, allowing the threat actor behind to harvest and exfiltrate sensitive information from infected systems. Dubbed "RotaJakiro" by researchers from Qihoo 360 NETLAB, the backdoor targets Linux X64 machines, and is so named after the fact that "the family uses rotate

Wednesday, 28 April 2021

Passwordstate Password Manager Suffered Supply-Chain Attack

Another serious supply-chain attack has surfaced online potentially affecting thousands of customers. This time, the…

Passwordstate Password Manager Suffered Supply-Chain Attack on Latest Hacking News.



Cybercriminals Widely Abusing Excel 4.0 Macro to Distribute Malware

Threat actors are increasingly adopting Excel 4.0 documents as an initial stage vector to distribute malware such as ZLoader and Quakbot, according to new research. The findings come from an analysis of 160,000 Excel 4.0 documents between November 2020 and March 2021, out of which more than 90% were classified as malicious or suspicious. <!--adsense--> "The biggest risk for the targeted

F5 BIG-IP Found Vulnerable to Kerberos KDC Spoofing Vulnerability

Cybersecurity researchers on Wednesday disclosed a new bypass vulnerability in the Kerberos Key Distribution Center (KDC) security feature impacting F5 Big-IP application delivery services. "The KDC Spoofing vulnerability allows an attacker to bypass the Kerberos authentication to Big-IP Access Policy Manager (APM), bypass security policies and gain unfettered access to sensitive workloads,"

Apple patches severe macOS security flaw

Mac users are being urged to update to macOS Big Sur 11.3 as at least one threat group is exploiting the zero-day bug to sneak past the operating system’s built-in security mechanisms

The post Apple patches severe macOS security flaw appeared first on WeLiveSecurity



PARETO Botnet Utilized Hacked Android Phones To Generate Fake Ad Views

Researchers have shared details of a new botnet dubbed ‘PARETO’ that exploited hacked Android devices…

PARETO Botnet Utilized Hacked Android Phones To Generate Fake Ad Views on Latest Hacking News.



Attention! FluBot Android Banking Malware Spreads Quickly Across Europe

Attention, Android users! A banking malware capable of stealing sensitive information is "spreading rapidly" across Europe, with the U.S. likely to be the next target. According to a new analysis by Proofpoint, the threat actors behind FluBot (aka Cabassous) have branched out beyond Spain to target the U.K., Germany, Hungary, Italy, and Poland. The English-language campaign alone has been

Tuesday, 27 April 2021

5 Cases of Blockchain for Cybersecurity

Blockchain tech is helping the world in more ways than we can think of, and…

5 Cases of Blockchain for Cybersecurity on Latest Hacking News.



Vulnerabilities In Cosori Smart Air Fryer Could Allow Remote Code Execution Attacks

Once again, researchers have demonstrated how the convenience of Internet-of-Things (IoT) can lead to security…

Vulnerabilities In Cosori Smart Air Fryer Could Allow Remote Code Execution Attacks on Latest Hacking News.



ToxicEye Malware Emerges As The Latest Threat To Telegram

Following the WhatsApp privacy policy update, Telegram has gained significant popularity among users. Perhaps, that’s…

ToxicEye Malware Emerges As The Latest Threat To Telegram on Latest Hacking News.



Hackers Threaten to Leak D.C. Police Informants' Info If Ransom Is Not Paid

The Metropolitan Police Department (MPD) of the District of Columbia has become the latest high-profile government agency to fall victim to a ransomware attack. The Babuk Locker gang claimed in a post on the dark web that they had compromised the DC Police's networks and stolen 250 GB of unencrypted files. Screenshots shared by the group, and seen by The Hacker News, include various folders

Security Vulnerabilities In John Deere API Could Expose Tractor Customers

Farming isn’t always safe from cyber threats – at least, that’s what some recently found…

Security Vulnerabilities In John Deere API Could Expose Tractor Customers on Latest Hacking News.



Cybersecurity Webinar: Understanding the 2020 MITRE ATT&CK Results

The release of MITRE Engenuity's Carbanak+Fin7 ATT&CK evaluations every year is a benchmark for the cybersecurity industry. The organization's tests measure how well security vendors can detect and respond to threats and offers an independent metric for customers and security leaders to understand how well vendors perform on a variety of tasks. However, for the uninitiated, the results can be

Hackers Exploit 0-Day Gatekeeper Flaw to Attack MacOS Computers

Security is only as strong as the weakest link. As further proof of this, Apple released an update to macOS operating systems to address an actively exploited zero-day vulnerability that could circumvent all security protections, thus permitting unapproved software to run on Macs. The macOS flaw, identified as CVE-2021-30657, was discovered and reported to Apple by security engineer Cedric Owens

FBI, CISA Uncover Tactics Employed by Russian Intelligence Hackers

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS), and the Federal Bureau of Investigation (FBI) on Monday published a new joint advisory as part of their latest attempts to expose the tactics, techniques, and procedures (TTPs) adopted by the Russian Foreign Intelligence Service (SVR) in its attacks targeting the U.S and foreign entities. By

CocoaPods RCE Vulnerability Could Risk 3 Million Mobile Apps Including Signal

A serious remote code execution flaw affected the CocoaPods package manager that could have risked…

CocoaPods RCE Vulnerability Could Risk 3 Million Mobile Apps Including Signal on Latest Hacking News.



Homebrew Package Manager Vulnerability Could Allow Code Execution Attacks

A serious vulnerability existed in the Homebrew package manager that could allow an attacker to…

Homebrew Package Manager Vulnerability Could Allow Code Execution Attacks on Latest Hacking News.



Monday, 26 April 2021

Wormable Malware Comes Back As ‘WhatsApp Pink’ – Now Targets Signal, Telegram Too

A new malicious campaign is active in the wild aiming at WhatsApp users. The campaign…

Wormable Malware Comes Back As ‘WhatsApp Pink’ – Now Targets Signal, Telegram Too on Latest Hacking News.



Signal CEO Highlights Vulnerabilities In Cellebrite Software

It hasn’t been a while that the forensic firm Cellebrite claimed to have decrypted Signal.…

Signal CEO Highlights Vulnerabilities In Cellebrite Software on Latest Hacking News.



Three SonicWall Zero-Day Bugs Under Active Attack – Patches Deployed – Update Now

SonicWall has recently fixed three zero-day bugs affecting its Email Security products. Though the patches…

Three SonicWall Zero-Day Bugs Under Active Attack – Patches Deployed – Update Now on Latest Hacking News.



Trend Micro Warns Users For Active Exploitation Of An Already-Patched Bug

Once again, the practice of procrastinating updates by the users has let the attackers exploit…

Trend Micro Warns Users For Active Exploitation Of An Already-Patched Bug on Latest Hacking News.



Valve Finally Patched A Steam RCE Vulnerability That Waited A Fix For Two Years

Valve, the giant behind the popular gaming platform Steam, had lately addressed a years-old flaw.…

Valve Finally Patched A Steam RCE Vulnerability That Waited A Fix For Two Years on Latest Hacking News.



Mining Tech Firm Gyrodata Suffered Ransomware Attack

As ransomware attacks continue to expand their targets, another firm has confessed to having become…

Mining Tech Firm Gyrodata Suffered Ransomware Attack on Latest Hacking News.



Serious SQL Vulnerability Found In Django Debug Toolbar

A high-severity vulnerability existed in the open-source Django Debug Toolbar. Exploiting this vulnerability could let…

Serious SQL Vulnerability Found In Django Debug Toolbar on Latest Hacking News.



Serious Vulnerability In Facebook Could Allow Deleting Live Videos

A serious vulnerability in the Facebook platform could allow an attacker to delete Live Videos.…

Serious Vulnerability In Facebook Could Allow Deleting Live Videos on Latest Hacking News.



Codecov Breach Following Supply-Chain Attack Affected Hundreds Of Networks

Another software giant has disclosed a security breach that potentially bears a long-term devastating impact.…

Codecov Breach Following Supply-Chain Attack Affected Hundreds Of Networks on Latest Hacking News.



4 common ways scammers use celebrity names to lure victims

All that glitters is not gold – look out for fake celebrity endorsements and other con jobs that aren’t going out of fashion any time soon

The post 4 common ways scammers use celebrity names to lure victims appeared first on WeLiveSecurity



Minnesota University Apologizes for Contributing Malicious Code to the Linux Project

Researchers from the University of Minnesota apologized to the maintainers of Linux Kernel Project on Saturday for intentionally including vulnerabilities in the project's code, which led to the school being banned from contributing to the open-source project in the future. "While our goal was to improve the security of Linux, we now understand that it was hurtful to the community to make it a

Apple AirDrop Bug Could Leak Your Personal Info to Anyone Nearby

New research has uncovered privacy weaknesses in Apple's wireless file-sharing protocol that could result in the exposure of a user's contact information such as email addresses and phone numbers. "As an attacker, it is possible to learn the phone numbers and email addresses of AirDrop users – even as a complete stranger," said a team of academics from the Technical University of Darmstadt,

How to Test and Improve Your Domain's Email Security?

No matter which type of business you are in, whether small, medium, or large, email has become an irrefutable tool for communicating with your employees, partners, and customers. Emails are sent and received each day in bulk by companies from various sources. In addition, organizations may also employ third-party vendors who may be authorized to send emails on behalf of the company. As a result,

Emotet Malware Destroys Itself Today From All Infected Computers

Emotet, the notorious email-based Windows malware behind several botnet-driven spam campaigns and ransomware attacks, was automatically wiped from infected computers en masse following a European law enforcement operation. The development comes three months after a coordinated disruption of Emotet as part of "Operation Ladybird" to seize control of servers used to run and maintain the malware

3.2 Billion Leaked Passwords Contain 1.5 Million Records with Government Emails

A staggering number of 3.28 billion passwords linked to 2.18 billion unique email addresses were exposed in what's one of the largest data dumps of breached usernames and passwords. In addition, the leak includes 1,502,909 passwords associated with email addresses from government domains across the world, with the U.S. government alone taking up 625,505 of the exposed passwords, followed by the

Saturday, 24 April 2021

Critical RCE Bug Found in Homebrew Package Manager for macOS and Linux

A recently identified security vulnerability in the official Homebrew Cask repository could have been exploited by an attacker to execute arbitrary code on users' machines that have Homebrew installed. The issue, which was reported to the maintainers on April 18 by a Japanese security researcher named RyotaK, stemmed from the way code changes in its GitHub repository were handled, resulting in a

Week in security with Tony Anscombe

WhatsApp Pink is not an update – Security holes in Apple's AirDrop – New zero-day plugged in Chrome

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



Instagram rolls out new features to help prevent cyberbullying

The social media platform is stepping up efforts to help stomp out harassment and other abusive behavior

The post Instagram rolls out new features to help prevent cyberbullying appeared first on WeLiveSecurity



Passwordstate Password Manager Update Hijacked to Install Backdoor on Thousands of PCs

Click Studios, the Australian software company behind the Passwordstate password management application, has notified customers to reset their passwords following a software supply chain attack. The Adelaide-based firm said a bad actor used sophisticated techniques to compromise the software's update mechanism and used it to drop malware on user computers. The breach is said to have occurred

Friday, 23 April 2021

New QNAP NAS Flaws Exploited In Recent Ransomware Attacks - Patch It!

A new ransomware strain called "Qlocker" is targeting QNAP network attached storage (NAS) devices as part of an ongoing campaign and encrypting files in password-protected 7zip archives. First reports of the infections emerged on April 20, with the adversaries behind the operations demanding a bitcoin payment (0.01 bitcoins or about $500.57) to receive the decryption key. In response to the

Prometei Botnet Exploiting Unpatched Microsoft Exchange Servers

Attackers are exploiting the ProxyLogon Microsoft Exchange Server flaws to co-opt vulnerable machines to a cryptocurrency botnet named Prometei, according to new research. "Prometei exploits the recently disclosed Microsoft Exchange vulnerabilities associated with the HAFNIUM attacks to penetrate the network for malware deployment, credential harvesting and more," Boston-based cybersecurity firm

Thursday, 22 April 2021

Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed details of a new advanced persistent threat (APT) that's leveraging the Supernova backdoor to compromise SolarWinds Orion installations after gaining access to the network through a connection to a Pulse Secure VPN device. "The threat actor connected to the entity's network via a Pulse Secure virtual private network (

AirDrop flaws could leak phone numbers, email addresses

You can only stay safe by disabling AirDrop discovery in the system settings of your Apple device, a study says

The post AirDrop flaws could leak phone numbers, email addresses appeared first on WeLiveSecurity



Researchers Find Additional Infrastructure Used By SolarWinds Hackers

The sprawling SolarWinds cyberattack which came to light last December was known for its sophistication in the breadth of tactics used to infiltrate and persist in the target infrastructure, so much so that Microsoft went on to call the threat actor behind the campaign "skillful and methodic operators who follow operations security (OpSec) best practices to minimize traces, stay under the radar,

Google rushes out fix for zero‑day vulnerability in Chrome

The update patches a total of seven security flaws in the desktop versions of the popular web browser

The post Google rushes out fix for zero‑day vulnerability in Chrome appeared first on WeLiveSecurity



Cost of Account Unlocks, and Password Resets Add Up

There are many labor-intensive tasks that the IT service desk carries out on a daily basis. None as tedious and costly as resetting passwords. Modern IT service desks spend a significant amount of time both unlocking and resetting passwords for end-users. This issue has been exacerbated by the COVID-19 pandemic. Causes of account lockouts and password resets End-user password policies, such as

Cybercriminals Using Telegram Messenger to Control ToxicEye Malware

Adversaries are increasingly abusing Telegram as a "command-and-control" system to distribute malware into organizations that could then be used to capture sensitive information from targeted systems. "Even when Telegram is not installed or being used, the system allows hackers to send malicious commands and operations remotely via the instant messaging app," said researchers from cybersecurity

Wednesday, 21 April 2021

Facebook Busts Palestinian Hackers' Operation Spreading Mobile Spyware

Facebook on Wednesday said it took steps to dismantle malicious activities perpetrated by two state-sponsored hacking groups operating out of Palestine that abused its platform to distribute malware. The social media giant attributed the attacks to a network connected to the Preventive Security Service (PSS), the security apparatus of the State of Palestine, and another threat actor is known as

NitroRansomware Demands Gift Codes As Ransom

A new ransomware threat has surfaced online that has a unique ransom demand. Identified as…

NitroRansomware Demands Gift Codes As Ransom on Latest Hacking News.



Improve Your Cyber Security Posture by Combining State of the Art Security Tools

Today there are plenty of cybersecurity tools on the market. It is now more important than ever that the tools you decide to use work well together. If they don't, you will not get the complete picture, and you won't be able to analyze the entire system from a holistic perspective.  This means that you won't be able to do the right mitigations to improve your security posture. Here are examples

WhatsApp Pink: Watch out for this fake update

The malware sends automated replies to messages on WhatsApp and other major chat apps

The post WhatsApp Pink: Watch out for this fake update appeared first on WeLiveSecurity



Hackers threaten to leak stolen Apple blueprints if $50 million ransom isn't paid

Prominent Apple supplier Quanta on Wednesday said it suffered a ransomware attack from the REvil ransomware group, which is now demanding the iPhone maker pay a ransom of $50 million to prevent leaking sensitive files on the dark web. In a post shared on its deep web "Happy Blog" portal, the threat actor said it came into possession of schematics of the U.S. company's products such as MacBooks

Update Your Chrome Browser ASAP to Patch a Week Old Public Exploit

Google on Tuesday released an update for Chrome web browser for Windows, Mac, and Linux, with a total of seven security fixes, including one flaw for which it says an exploit exists in the wild. Tracked as CVE-2021-21224, the flaw concerns a type confusion vulnerability in V8 open-source JavaScript engine that was reported to the company by security researcher Jose Martinez on April 5 According

Tuesday, 20 April 2021

3 Zero-Day Exploits Hit SonicWall Enterprise Email Security Appliances

SonicWall has addressed three critical security vulnerabilities in its hosted and on-premises email security (ES) product that are being actively exploited in the wild. Tracked as CVE-2021-20021 and CVE-2021-20022, the flaws were discovered and reported to the company by FireEye's Mandiant subsidiary on March 26, 2021, after the cybersecurity firm detected post-exploitation web shell activity on

WARNING: Hackers Exploit Unpatched Pulse Secure 0-Day to Breach Organizations

If the Pulse Connect Secure gateway is part of your organization network, you need to be aware of a newly discovered critical zero-day authentication bypass vulnerability (CVE-2021-22893) that is currently being exploited in the wild and for which there is no patch yet. At least two threat actors have been behind a series of intrusions targeting defense, government, and financial organizations

Over 750,000 Users Downloaded New Billing Fraud Apps From Google Play Store

Researchers have uncovered a new set of fraudulent Android apps in the Google Play store that were found to hijack SMS message notifications for carrying out billing fraud. The apps in question primarily targeted users in Southwest Asia and the Arabian Peninsula, attracting a total of 700,000 downloads before they were discovered and removed from the platform. The findings were reported

[eBook] Why Autonomous XDR Is Going to Replace NGAV/EDR

For most organizations today, endpoint protection is the primary security concern. This is not unreasonable – endpoints tend to be the weakest points in an environment – but it also misses the forest for the trees. As threat surfaces expand, security professionals are harder pressed to detect threats that target other parts of an environment and can easily miss a real vulnerability by focusing

120 Compromised Ad Servers Target Millions of Internet Users

An ongoing malvertising campaign tracked as "Tag Barnakle" has been behind the breach of more than 120 ad servers over the past year to sneakily inject code in an attempt to serve malicious advertisements that redirect users to rogue websites, thus exposing victims to scamware or malware. Unlike other operators who set about their task by infiltrating the ad-tech ecosystem using "convincing

Vulnerability In Juniper Networks Junos OS Could Allow Remote Code Execution

A security vulnerability directly affected Juniper Networks Junos OS allowing remote code execution attacks. The…

Vulnerability In Juniper Networks Junos OS Could Allow Remote Code Execution on Latest Hacking News.



Vulnerability In Duo Security App 2FA Could Allow Account Takeover

Duo, the security app offering login authentication features, had a serious vulnerability threatening users’ accounts.…

Vulnerability In Duo Security App 2FA Could Allow Account Takeover on Latest Hacking News.



New JavaScript-based SMASH Attack Confirms Rowhammer Bug As A Persistent Threat

While Rowhammer attacks are nothing new, another exploitation of the bug has arrived. Dubbed SMASH,…

New JavaScript-based SMASH Attack Confirms Rowhammer Bug As A Persistent Threat on Latest Hacking News.



Google’s Project Zero to wait longer before disclosing bug details

The 30-day grace period is designed to speed up the rollout and adoption of patches

The post Google’s Project Zero to wait longer before disclosing bug details appeared first on WeLiveSecurity



Mozilla Plans To Remove FTP Implementation With Firefox 90

Mozilla has announced a major change with its upcoming update to the Firefox browser. With…

Mozilla Plans To Remove FTP Implementation With Firefox 90 on Latest Hacking News.



Monday, 19 April 2021

Lazarus APT Hackers are now using BMP images to hide RAT malware

A spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code within a bitmap (.BMP) image file to drop a remote access trojan (RAT) capable of stealing sensitive information. Attributing the attack to the Lazarus Group based on similarities to prior tactics adopted by the adversary, researchers from Malwarebytes

Google Patched Two New Zero-Day Bugs – Also, Chrome 90 Rolled Out!

Google has recently released the new Chrome 90 browser version to its users. This update…

Google Patched Two New Zero-Day Bugs – Also, Chrome 90 Rolled Out! on Latest Hacking News.



Hackers Set Up 100,000 Websites Delivering Malware Via Malicious PDFs

Researchers have found thousands of malicious web pages existing online that constitute a serious malware…

Hackers Set Up 100,000 Websites Delivering Malware Via Malicious PDFs on Latest Hacking News.



Two WhatsApp Vulnerabilities Could Allow Stealing Sensitive Data, Hacking Phones

Heads up, WhatsApp users! Two separate vulnerabilities in WhatsApp could potentially expose sensitive user data…

Two WhatsApp Vulnerabilities Could Allow Stealing Sensitive Data, Hacking Phones on Latest Hacking News.



Numerous Desktop Apps Found Vulnerable To 1-Click Hacking Flaws – Patches Rolled Out

Researchers have found multiple desktop apps vulnerable to 1-click flaws. These include different popular apps…

Numerous Desktop Apps Found Vulnerable To 1-Click Hacking Flaws – Patches Rolled Out on Latest Hacking News.



This Phishing Campaign Delivers IcedID Malware Via Web Contact Forms – Warns Microsoft

Microsoft has recently warned users of a new phishing campaign active in the wild. This…

This Phishing Campaign Delivers IcedID Malware Via Web Contact Forms – Warns Microsoft on Latest Hacking News.



Microsoft April Patch Tuesday Fixed 109 Bugs Including A Zero-Day

This week, Microsoft has released its scheduled monthly update bundle for April 2021. The April…

Microsoft April Patch Tuesday Fixed 109 Bugs Including A Zero-Day on Latest Hacking News.



Which are the games you can play on VR?

In this article, we will talk about the top games you can play on a…

Which are the games you can play on VR? on Latest Hacking News.



Why should you use Node.JS for your web application?

Starting with its speed and finishing with its proficiency at multi-user, real-time web applications, there…

Why should you use Node.JS for your web application? on Latest Hacking News.



70+ Million Twitter Users Data Dumped For Sale After Facebook, LinkedIn

While the reports of Facebook and LinkedIn data dump incidents affecting millions haven’t lost traction,…

70+ Million Twitter Users Data Dumped For Sale After Facebook, LinkedIn on Latest Hacking News.



Passwordless: More Mirage Than Reality

The concept of "passwordless" authentication has been gaining significant industry and media attention. And for a good reason. Our digital lives are demanding an ever-increasing number of online accounts and services, with security best practices dictating that each requires a strong, unique password in order to ensure data stays safe. Who wouldn't want an easier way? That's the premise behind