Intel Patch Tuesday updates for July 2019 address a serious flaw in Processor Diagnostic Tool and minor issue in the Solid State Drives (SSD) for Data Centers (DC). Intelâs Patch Tuesday security updates for July 2019 address a serious flaw in the Processor Diagnostic Tool and another issue in the Solid State Drives (SSD) for […]
Malware researchers from Kaspersky have discovered new and improved versions of the infamous FinFisher spyware used to infect both Android and iOS devices. Experts at Kaspersky have discovered a new improved variant of the FinFisher spyware used to spy on both iOS and Android users in 20 countries. According to the experts, the new versions […]
The UK’s data privacy regulator plans to fine giant hotel chain Marriott International with a ÂŁ99 million ($123 million) under GDPR over 2014 data breach. The company replied that it will fight against the fine, it could reply to the UK ICO’s proposal before the final determination. The UK’s data privacy regulator announced that the giant hotel […]
Liran Tal, a developer advocate at open-source security platform Snyk, discovered a high-severity prototype pollution security flaw that affects all versions of lodash. Lodash is a JavaScript library which provides utility functions for common programming tasks using the functional programming paradigm. Liran Tal, a developer advocate at Snyk, discovered a high-severity prototype pollution vulnerability, tracked as CVE-2019-10744, that affects all […]
The Maryland Department of Labor announced it has suffered a data breach announced that exposed personally identifiable information. The Maryland Department of Labor suffered a data breach, hackers accessed databases containing personally identifiable information (PII). The security breach was discovered earlier this year, hackers also accessed data stored in the Literacy Works Information System and […]
Zoom video conferencing software for Mac is affected by a flaw that could allow attackers to take over webcams when users visit a website. Cybersecurity expert Jonathan Leitschuh disclosed an unpatched critical security vulnerability in the Zoom app for Apple Mac computers, that is chained with another issue, could be exploited by attackers to execute […]
Microsoft Defender ATP Research Team discovered a fileless malware campaign that was spreading the information stealing Astaroth Trojan. Experts at the Microsoft Defender ATP Research Team discovered a fileless malware campaign that is delivering the information stealing Astaroth Trojan. The malware is able to log the usersâ keystrokes, collect information through hooking, access clipboard content, and monitor […]
Government computer systems at La Porte County, Indiana, were shut down after a cyber attack hit them on July 6. Experts believe it was a ransomware attack. On July 6, a cyber attack brought down government computer systems at La Porte County, Indiana. At the time of writing, there were only a few details about […]
The developer Tute Costa found a backdoor in the Ruby library during regular security audits before deploying his code in the production environment. The developer Tute Costa found a backdoor in the Ruby library during regular security audits. The dangerous code was used to check the password strength of user-chosen passwords when the library was being […]
Threat actors targeted two high-profile PGP project contributors with the intent to poison certificates used by the SKS keyserver network. Contributors to the PGP protocol GnuPG claim that threat actors are âpoisoningâ their certificates, this means that attackers spam their certificate with a large number of signatures. The intent is to make it impossible for […]