Security

<strong>Android app with over 5m downloads leaked user browsing history</strong>

The Android app Web Explorer – Fast Internet left an open instance, exposing a trove of sensitive data that malicious…

3 years ago

Sophos fixed a critical flaw in its Sophos Firewall version 19.5

Sophos addressed several vulnerabilities affecting its Sophos Firewall version 19.5, including arbitrary code execution issues. Sophos has released security patches…

3 years ago

French hospital cancels operations after a ransomware attack

A French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the weekend.…

3 years ago

Critical Ping bug potentially allows remote hack of FreeBSD systems

A critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD systems. The maintainers…

3 years ago

Law enforcement agencies can extract data from thousands of cars’ infotainment systems

Law enforcement agencies can extract data from the infotainment systems of thousands of different car models. Data managed by infotainment…

3 years ago

Google fixed the ninth actively exploited Chrome zeroday this year

Google released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in the wild. Google…

3 years ago

A new Linux flaw can be chained with other two bugs to gain full root privileges

Qualys researchers demonstrated how to chain a new Linux flaw with two other two issues to gain full root privileges…

3 years ago

North Korea ScarCruft APT used previously undetected Dolphin Backdoor against South Korea

North Korea-linked ScarCruft group used a previously undocumented backdoor called Dolphin against targets in South Korea. ESET researchers discovered a previously undocumented backdoor called Dolphin…

3 years ago

Lastpass discloses the second security breach this year

LastPass disclosed a new security breach, threat actors had access to its cloud storage using information stolen in the August…

3 years ago

Attackers abused the popular TikTok Invisible Challenge to spread info-stealer

Threat actors are exploiting interest in a popular TikTok challenge, dubbed Invisible Challenge, to trick users into downloading info-stealing malware.…

3 years ago

This website uses cookies.