Home

Hackers Exploit Microsoft Teams for Remote System Access

Hackers used Microsoft Teams to trick victims into granting remote system access, showcasing advanced social engineering tactics, according to Trend Micro. All about the attack - Microsoft Teams Exploit The [...]

Dell Security Update Patches Multiple Critical Vulnerabilities

Dell Technologies has issued a security advisory for critical vulnerabilities that could be exploited by attackers. Customers should update their systems to fix two critical CVEs affecting multiple Dell products. [...]

By | December 13th, 2024|Internet Security, Security Advisory, Security Update, vulnerability|0 Comments

Stealthy Linux Malware PUMAKIT Escalates Privileges

Researchers at Elastic Security Labs discovered PUMAKIT, a Linux malware using stealth and unique privilege escalation to persist on infected systems. PUMAKIT has a multi-stage setup, including a dropper, two [...]

Emoji Exploit Targets iOS Messenger Group Calls

A new vulnerability in Facebook Messenger for iOS could disrupt group calls by exploiting emoji reactions. Discovered by Signal 11 Research in version 472.0.0 and analyzed in version 477.0.0, this [...]

Skoda and Volkswagen car vulnerabilities allow hackers to track users remotely

Researchers have found vulnerabilities in the infotainment systems of some Skoda and Volkswagen cars, which could let hackers track users and access sensitive data remotely. PCAutomotive, an automotive cybersecurity firm, [...]

By | December 12th, 2024|Internet Security, Security Advisory, Security Update, vulnerability|0 Comments

Subscribe to our newsletter to receive security tips everday!