Home 2017-08-28T17:57:09+05:30

Expert Analysis Reveals Cryptographic Weaknesses in Threema Messaging App

A comprehensive analysis of the cryptographic protocols used in the Swiss encrypted messaging application Threema has revealed a number of loopholes. What is Threema? Threema's end-to-end inner protocol, the one [...]

Microsoft ends Windows 7 extended security updates on Tuesday

Windows 7 Professional and Enterprise editions will no longer receive extended security updates for critical and important vulnerabilities starting Tuesday, January 10, 2023.  Alongside this, the Redmond company encourages Windows [...]

Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors

Organisations that fell victim to Andromeda, a commodity malware that dates back 12 years, seem to be at risk of compromise by the Moscow-backed advanced persistent threat (APT) group tracked variously [...]

Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub

South African threat actors known as 'Automated Libra' has been improving their techniques to make a profit by using cloud platform resources for cryptocurrency mining. PURPLEURCHIN first came to light [...]

Synology Fixes a Max Severity RCE Vulnerability in VPN Server Products

"Taiwan-based NAS maker Synology has addressed a maximum (10/10) severity vulnerability affecting routers configured to run as VPN servers.The vulnerability, tracked as CVE-2022-43931, was discovered internally by Synology's Product Security Incident [...]

Subscribe to our newsletter to receive security tips everday!