A critical flaw in Zoom Clients allows attackers to escalate privileges
A vulnerability categorized as improper input validation was discovered in Zoom Clients for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows. This flaw could potentially enable [...]
GitHub Campaign Targets Users to Steal Login Credentials
Threat actors frequently target GitHub users because of the abundance of valuable code repositories and sensitive information stored on the platform. However, GitHub's collaborative nature also makes it an exceptional [...]
Hackers weaponize LNK files to deploy AutoIt malware
Hackers are using weaponized LNK files to deploy AutoIt malware, causing concern in the cybersecurity community. The LNK Malware Infection The infection chain starts with what appears to be a [...]
Hackers deploy TMChecker RAT to target popular VPN and mail servers
A new tool discovered on the Dark Web indicates a change in cybercriminal tactics for illicitly accessing corporate networks. TMChecker, recently uncovered by ReSecurity, is engineered to target remote-access services [...]
PixPirate, an Android banking malware
PixPirate, an Android banking malware, is pioneering stealth techniques to evade detection. IBM Trusteer researchers have unveiled its sophisticated methods, posing significant threats to financial institutions, especially in Brazil. What [...]





Get Social