Home 2017-08-28T17:57:09+05:30

FlyingYeti Uses WinRAR Flaw for Malware Attacks

Since Russia's invasion of Ukraine on February 24, 2022, tensions have been high globally. Following the invasion, Ukraine imposed a moratorium on utility service evictions and terminations for unpaid debt, [...]

Citrix Workspace App Lets Attackers Elevate Privileges from User to Root

A critical vulnerability in the Citrix Workspace app for Mac, tracked as CVE-2024-5027, could allow attackers to elevate privileges from a local authenticated user to root. This poses a significant [...]

Cybercriminals are Using Microsoft Office Documents to Spread Malware in Business Environments

Microsoft Office provides tools for creating professional reports, college essays, CVs, and notes on Office 365. It offers text and data editing features, including macros and Python scripting in Excel, [...]

Foxit PDF Reader and Editor Flaw Enables Privilege Escalation

A new privilege escalation vulnerability (CVE-2024-29072, severity 8.2 High) has been discovered in multiple versions of Foxit PDF Reader for Windows. Foxit has fixed the issue and published a security [...]

New Embargo Ransomware Discovered, Potential ALPHV Rebirth

A new ransomware strain called Embargo, written in Rust, has surfaced with its Darknet infrastructure. Using double extortion tactics, it resembles the recently seized ALPHV group. The novice gang already [...]

Subscribe to our newsletter to receive security tips everday!