Microsoft found several high-severity vulnerabilities in a mobile framework used in pre-installed Android System apps. The Microsoft 365 Defender Research…
Security researchers devised a technique, dubbed GhostTouch, to remotely control touchscreens using electromagnetic signals. A team of researchers from Zhejiang…
The FBI warns organizations in the higher education sector of credentials sold on cybercrime forums that can allow threat actors…
Security researchers released PoC exploit code for the critical authentication bypass vulnerability CVE-2022-22972 affecting multiple VMware products. Horizon3 security researchers…
An investigation of the infamous “Is That You?” video scam led Cybernews researchers into exposing threat actors who are poisoning…
Zyxel addressed multiple vulnerabilities impacting many of its products, including APs, AP controllers, and firewalls. Zyxel has released security updates…
Researchers warn of a new malvertising campaign spreading the ChromeLoader malware that hijacks the victims' browsers. Researchers from Red Canary…
An unknown APT group is targeting Russian government entities since the beginning of the Russian invasion of Ukraine. Researchers from…
Security flaws in Zoom can be exploited to compromise another user over chat by sending specially crafted messages. A set…
Trend Micro addressed a DLL hijacking issue in Trend Micro Security actively exploited by a China-linked threat group to deploy…
This website uses cookies.