Google fixes 2 new actively exploited zero-day flaws in Chrome

4 years ago

Google rolled out urgent security updates to address two new actively exploited zero-day vulnerabilities in its Chrome browser. Google this…

Weaponizing Apple AirTag to lure users to malicious sites

4 years ago

Threat actors could exploit a stored cross-site scripting (XSS) vulnerability in Apple AirTag product to lure users to malicious websites.…

Experts show how to make fraudulent payments using Apple Pay with VISA on locked iPhones

4 years ago

Security researchers devised a new attack method against iPhone owners using Apple Pay and Visa payment cards. Boffins from the…

Popular Android apps with 142.5 million collective installs leak user data

4 years ago

14 top Android apps with 142.5 million installs are misconfigured, leaving their data exposed to unauthorized parties Original post @…

Threat actors use recently discovered CVE-2021-26084 Atlassian Confluence

4 years ago

Threat actors are actively exploiting the recently disclosed CVE-2021-26084 RCE vulnerability in Atlassian Confluence deployments. Trend Micro researchers have spotted…

CISA releases Insider Risk Mitigation Self-Assessment Tool

4 years ago

The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider…

Facebook released Mariana Trench tool to find flaws in Android and Java apps

4 years ago

Facebook released Mariana Trench, an internal open-source tool that can be used to identify vulnerabilities in Android and Java applications.…

Expert discloses new iPhone lock screen vulnerability in iOS 15

4 years ago

The security researcher Jose Rodriguez discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet…

GriftHorse malware infected more than 10 million Android phones from 70 countries

4 years ago

Security researchers uncovered a massive malware operation, dubbed GriftHorse, that has already infected more than 10 million Android devices worldwide.…

NSA, CISA release guidance on hardening remote access via VPN solutions

4 years ago

The U.S. CISA and the NSA agencies have published guidance for securely using virtual private network (VPN) solutions. The U.S.…

This website uses cookies.