Home 2017-08-28T17:57:09+00:00

Popular Mobile Browsers Found With Multiple Address Bar Spoofing Vulnerabilities

Cyber Security researchers disclosed vulnerability details of multiple popular browsers about an Address Bar Spoofing vulnerability affecting mobile browsers leaving the door open for spear-phishing attacks and delivering malware. Address [...]

By | October 21st, 2020|Security Update|0 Comments

Hackers want to “make the world a better place” By Donating Charities In Cryptocurrency

Security experts were amazed for the first time, as a Hacking group is donating the stolen money to charities. According to a BBC report published Monday, members of the hacking [...]

By | October 20th, 2020|Targeted Attacks, Tips|0 Comments

Alert! Emotet Malware’s New “Windows Update” Attachment

Emotet is a Trojan that is primarily spread through spam emails (malspam). The infection may arrive either via a malicious script, macro-enabled document files, or malicious link.  Emotet emails may contain messages like a familiar [...]

By | October 19th, 2020|Software Issues|0 Comments

Homeland Security Update – New Windows 10 Remote Hacking Threat

The Department of Homeland Security, Cybersecurity Agency, urges Windows 10 users to apply for security updates. On September 18, The U.S. Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA) [...]

By | October 18th, 2020|Security Update, Software Issues|0 Comments

Zero-Click Vulnerability in Linux Bluetooth Stack

Google researchers warned on a new set of potential security vulnerabilities(allow escalation of privilege or information disclosure) in BlueZ may allow escalation of privilege or information disclosure. BlueZ is releasing [...]

By | October 16th, 2020|Security Update, Software Issues|0 Comments

Microsoft Released Security Patch for 87 newly discovered Vulnerabilities

Microsoft released patches for 87 newly discovered vulnerabilities on its October 2020 Patch Tuesday. Of the 87 vulnerabilities fixed today, 12 are classified as Critical, and 74 are classified as Important, and one as [...]

By | October 14th, 2020|Security Update|0 Comments

Vulnerabilities Found in Top AntiVirus Software

Cyber Security researchers disclosed details of vulnerabilities found in popular Anti-Virus solutions that could enable attackers to elevate their privileges, thereby helping malware sustain its foothold on the compromised systems. [...]

By | October 7th, 2020|Security Update, Software Issues|0 Comments

Ransomware Delete Volume Shadow Copies – Install the Vaccine To Monitor

What is Shadow Volume Copies? Shadow Copy is a technology included in Microsoft Windows that can create backup copies or snapshots of computer files or volumes, even when they are [...]

By | October 5th, 2020|Ransomware|0 Comments

US Hospital Hit By SunCrypt Ransomware – HIPAA Data Leaked

University Hospital New Jersey in Newark, New Jersey - Paid a ransom of $670,000 demanded by the attacker to prevent from publishing the stolen data of about 240GB, including patient [...]

By | October 3rd, 2020|Ransomware, Targeted Attacks|0 Comments

Disrupt on US Presidential Debate – Twitter removed 130 Iranian Accounts

Twitter removed some accounts based on the tip provided by the FBI. As there was an attempt to disrupt the public conversation during last night's first Presidential Debate for the [...]

By | October 1st, 2020|Security Update|0 Comments

“Zerologon” Exploit for Netlogon Remote Protocol

Vulnerability - CVE-2020-1472 Description: An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), [...]

By | September 15th, 2020|Software Issues|0 Comments

Porn Sites redirecting to Exploit Kits – Malsmoke Group

A cybercrime group named Malsmoke has been targeting porn sites with malicious ads redirecting users to exploit kits. Over the past few months, a hacker group dubbed Malsmoke has been [...]

By | September 14th, 2020|Software Issues, Targeted Attacks|0 Comments

Red Hat CloudForms – 2020:3574 – Security Advisory

Type/Severity Security Advisory: Critical Topic An update is now available for CloudForms Management Engine 5.10. Description A high severity vulnerability was found in all active versions of Red Hat CloudForms [...]

By | September 1st, 2020|Security Update, Software Issues|0 Comments

The new Red Dawn Template – Emotet

Emotet Trojan:- Emotet is a Trojan that is primarily spread through spam emails (malspam). The infection may arrive either via malicious script, macro-enabled document files, or malicious link. Emotet emails may contain familiar branding designed [...]

By | August 30th, 2020|Ransomware, Targeted Attacks, Tips|0 Comments

Security Update – IBM Security Guardium

IBM Security Guardium Insights is affected by an Open Redirect vulnerability Summary IBM Security Guardium Insights has addressed the following vulnerability. Vulnerability Details CVEID:   CVE-2020-4598 DESCRIPTION:   IBM Security Guardium Insights [...]

By | August 27th, 2020|Security Update, Tips|0 Comments

Subscribe to our newsletter to receive security tips everday!