Home 2017-08-28T17:57:09+05:30

Details Released for Recently Patched new macOS Archive Utility Vulnerability

Security researchers have shared facts about a now-addressed security flaw in Apple’s macOS functioning technique that could be possibly exploited to run destructive applications in a manner that can bypass [...]

BlackByte ransomware abuses legit driver to disable security products

The BlackByte ransomware gang is using a new technique that researchers are calling “Bring Your Own Driver,” which enables bypassing protections by disabling more than 1,000 drivers used by various [...]

Experts Warn of New RatMilad Android Spyware Targeting Enterprise Devices

A novel Android malware referred to as RatMilad has been observed concentrating on a Middle Jap business cell device by concealing by itself as a VPN and phone selection spoofing [...]

Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers

The recently learned Linux-Based ransomware pressure acknowledged as Cheerscrypt has been attributed to a Chinese cyber espionage team regarded for working short-lived ransomware techniques. Cybersecurity agency Sygnia attributed the assaults [...]

Microsoft Exchange server zero-day mitigation can be bypassed

Last week, Microsoft confirmed that two zero-day vulnerabilities in Microsoft Exchange recently disclosed by researchers at cybersecurity firm GTSC are being actively exploited in the wild. The first flaw, tracked as CVE-2022-41040, [...]

By | October 4th, 2022|Internet Security, Microsoft, Security Advisory, Security Update|0 Comments

Subscribe to our newsletter to receive security tips everday!