Hackers Exploit Microsoft Teams for Remote System Access
Hackers used Microsoft Teams to trick victims into granting remote system access, showcasing advanced social engineering tactics, according to Trend Micro. All about the attack - Microsoft Teams Exploit The [...]
Dell Security Update Patches Multiple Critical Vulnerabilities
Dell Technologies has issued a security advisory for critical vulnerabilities that could be exploited by attackers. Customers should update their systems to fix two critical CVEs affecting multiple Dell products. [...]
Stealthy Linux Malware PUMAKIT Escalates Privileges
Researchers at Elastic Security Labs discovered PUMAKIT, a Linux malware using stealth and unique privilege escalation to persist on infected systems. PUMAKIT has a multi-stage setup, including a dropper, two [...]
Emoji Exploit Targets iOS Messenger Group Calls
A new vulnerability in Facebook Messenger for iOS could disrupt group calls by exploiting emoji reactions. Discovered by Signal 11 Research in version 472.0.0 and analyzed in version 477.0.0, this [...]
Skoda and Volkswagen car vulnerabilities allow hackers to track users remotely
Researchers have found vulnerabilities in the infotainment systems of some Skoda and Volkswagen cars, which could let hackers track users and access sensitive data remotely. PCAutomotive, an automotive cybersecurity firm, [...]