Home

Hackers Exploit Linux SSH Services to Deploy Malware

SSH and RDP provide remote server access (Linux and Windows respectively) for administration. Both protocols are vulnerable to brute-force attacks if strong passwords and access controls are not used. Attackers [...]

Critical Flaw in Apple Ecosystems Allows Unauthorized Access

Hackers target Apple due to its large user base and wealthy customers, including business people and managers with important information. Despite strong security measures, Apple remains a target because valuable [...]

SSLoad Malware Utilizes MSI Installer to Initiate Delivery Chain

Malware distributors exploit MSI installers because Windows OS inherently trusts them to run with administrative rights, bypassing security controls. This makes MSI files a convenient method for disseminating ransomware, spyware, [...]

Biometric Terminal Exposed to QR Code SQL Injection Vulnerability

A popular ZKTeco biometric terminal has critical vulnerabilities, including an SQL injection flaw via QR codes. This discovery raises serious concerns about the security of widely used biometric access control [...]

EmailGPT Vulnerability Exposes Sensitive Data to Attackers

A new prompt injection vulnerability, CVE-2024-5184, has been found in EmailGPT, the service and Chrome plugin that assists Gmail users in composing emails with OpenAI's GPT model. This vulnerability allows [...]

Subscribe to our newsletter to receive security tips everday!