Home 2017-08-28T17:57:09+05:30

Watch Out for Fake Palo Alto Tool Spreading Advanced Malware

A sophisticated malware is threatening organizations in the Middle East by disguising itself as the legitimate Palo Alto GlobalProtect tool. It uses a two-stage infection process and advanced command-and-control (C&C) [...]

Critical Vulnerability in Perl Installer Enables Traffic Interception

A critical vulnerability in App::cpanminus (cpanm), a popular tool for installing Perl modules, has been identified. Known as CVE-2024-45321, it allows attackers to intercept and manipulate traffic during module installation, [...]

Research Uncovers Eight Android and iOS Apps Leaking Users’ Sensitive Data

The eight Android and iOS apps fail to protect user data by transmitting sensitive information, such as device details, geolocation, and credentials, over HTTP instead of HTTPS. This exposes data [...]

EDR Killer Malware Disables Security Tools on Windows Machines

Attackers can exploit Windows drivers to bypass security by exploiting vulnerabilities or using stolen signatures to load malicious drivers into the kernel, disabling protections. While Microsoft enforces driver signature rules, [...]

Subscribe to our newsletter to receive security tips everday!