Cisco Webex Meetings Flaw Enables Unauthorized Access
Cisco disclosed a major security vulnerability in its Webex Meetings platform, affecting some customers in its Frankfurt data center since early May 2024. The vulnerability in Cisco Webex Meetings, found [...]
Caution: Phishing Emails Urging Execution via Paste (CTRL+V)
Phishing attackers distribute email attachments with malicious HTML files designed to exploit users into running the code by prompting them to paste and execute it, leveraging social engineering. A phishing [...]
Security Vulnerability in Zyxel NAS Devices Enables Remote System Takeover
Zyxel has identified and released security patches for critical vulnerabilities affecting their NAS326 and NAS542 devices. These vulnerabilities, known as command injection and remote code execution, could allow attackers to [...]
Hackers Use Cracked MS Office Versions to Deliver Malware
In South Korea, attackers distribute malware disguised as cracked software, including RATs and crypto miners, and register themselves with the Task Scheduler for persistence. Even after initial removal, the Task [...]
CarnavalHeist Uses Word Documents to Steal Login Credentials
Hackers exploit the widespread use and trust of Word documents, easily deceiving users into opening them. These documents can contain macros or exploits that run malicious code, enabling data theft, [...]





Get Social