CISA Issues Alert for Juniper Secure Analytics Vulnerabilities
In a recent alert, the Cybersecurity and Infrastructure Security Agency (CISA) highlighted that Juniper has issued security updates to resolve several vulnerabilities in the Juniper Secure Analytics Virtual Appliance. This [...]
Google accounts may be susceptible to a new hack, and changing the password won’t provide a solution.
A purportedly new method allows hackers to exploit the OAuth2 authorization protocol to compromise Google accounts. This enables them to maintain valid sessions by regenerating cookies, regardless of IP or [...]
Microsoft Disables MSIX App Installer Protocol
Microsoft has disabled the MSIX installer protocol in Windows in response to its exploitation in real-world cyberattacks. Hackers discovered a method to abuse the protocol, allowing them to install malicious [...]
Misconfigurations in Google Kubernetes Engine (GKE) Lead to a Privilege Escalation Exploit Chain
A recent Unit 42 investigation uncovered a dual privilege escalation chain affecting Google Kubernetes Engine (GKE). Stemming from misconfigurations in GKE's FluentBit logging agent and Anthos Service Mesh (ASM), this [...]
Xamalicious Trojan Hits Over 327K Android Devices
Researchers uncovered a novel Android backdoor named Xamalicious at the end of 2023. This malware demonstrates significant capabilities to carry out malicious actions on compromised devices, leveraging Android's accessibility permissions [...]