The phone monitoring app LetMeSpy disclosed a data breach

2 years ago

Android app LetMeSpy disclosed a security breach, sensitive data associated with thousands of Android users were exposed. The phone monitoring app LetMeSpy…

Previously undetected ThirdEye malware appears in the threat landscape

2 years ago

A new Windows information stealer dubbed ThirdEye appeared in the threat landscape, it has been active since April. Fortinet FortiGuard Labs discovered…

Former Group-IB manager has been arrested in Kazahstan

2 years ago

The former head of network security at Group-IB has been arrested in Kazakhstan based on a request from U.S. law…

Experts published PoC exploits for Arcserve UDP authentication bypass issue

2 years ago

Data protection firm Arcserve addressed an authentication bypass vulnerability in its Unified Data Protection (UDP) backup software. Data protection vendor…

Using Electromagnetic Fault Injection Attacks to take over drones

2 years ago

Electromagnetic fault injection (EMFI) attacks on drones can potentially allow attackers to achieve arbitrary code execution and take over them.…

Experts warn of a spike in May and June of 8Base ransomware attacks

2 years ago

Researchers warn of a massive spike in May and June 2023 of the activity associated with the ransomware group named 8Base.…

Critical SQL Injection flaws in Gentoo Soko can lead to Remote Code Execution

2 years ago

SQL injection vulnerabilities in Gentoo Soko could lead to remote code execution (RCE) on impacted systems. SonarSource researchers discovered two…

EncroChat dismantling led to 6,558 arrests and the seizure of $979M in criminal funds

2 years ago

Europol announced that the takedown of the EncroChat encrypted chat network has led to the arrest of 6,558 people and…

Mockingjay process injection technique allows EDR bypass

2 years ago

Mockingjay is a new process injection technique that can be exploited to bypass security solutions to execute malware on compromised…

Experts found hundreds of devices within federal networks having internet-exposed management interfaces

2 years ago

Researchers at Censys have identified hundreds of devices deployed within federal networks that have internet-exposed management interfaces. Researchers at Censys…

This website uses cookies.