Hacking

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog

CISA has added nine flaws to its Known Exploited Vulnerabilities catalog, including bugs exploited by commercial spyware on mobile devices.…

3 years ago

Hackers are actively exploiting a flaw in the Elementor Pro WordPress plugin

Threat actors are actively exploiting a high-severity flaw in the Elementor Pro WordPress plugin used by more than eleven million…

3 years ago

Russian APT group Winter Vivern targets email portals of NATO and diplomats

Russian hacking group Winter Vivern has been actively exploiting Zimbra flaws to steal the emails of NATO and diplomats. A…

3 years ago

Super FabriXss vulnerability in Microsoft Azure SFX could lead to RCE

Researchers shared details about a flaw, dubbed Super FabriXss, in Azure Service Fabric Explorer (SFX) that could lead to unauthenticated…

3 years ago

New AlienFox toolkit harvests credentials for tens of cloud services

AlienFox is a novel comprehensive toolset for harvesting credentials for multiple cloud service providers, SentinelLabs reported. AlienFox is a new…

3 years ago

3CX voice and video conferencing software victim of a supply chain attack

Popular voice and video conferencing software 3CX was the victim of a supply chain attack, SentinelOne researchers reported. As of…

3 years ago

New Mélofée Linux malware linked to Chinese APT groups

Exatrack researchers warn of an unknown China-linked hacking group that has been linked to a new Linux malware, dubbed Mélofée. Cybersecurity…

3 years ago

OpenAI quickly fixed account takeover bugs in ChatGPT

OpenAI addressed multiple severe vulnerabilities in the popular chatbot ChatGPT that could have been exploited to take over accounts. OpenAI…

3 years ago

Google TAG shares details about exploit chains used to install commercial spyware

Google's Threat Analysis Group (TAG) discovered several exploit chains targeting Android, iOS, and Chrome to install commercial spyware. Google's Threat…

3 years ago

Clipper attacks use Trojanized TOR Browser installers

Researchers discovered malware-laced installers for the TOR browser that is spreading clipper malware in Russia and Eastern Europe. Kaspersky researchers…

3 years ago

This website uses cookies.