GRUB2 Vulnerabilities Put Millions of Linux Devices at Risk
GRUB2 vulnerabilities expose millions of Linux devices to secure boot bypass and remote code execution. Discovered during a security audit, these flaws impact filesystem parsing, memory management, and network settings. [...]
Updated TgToxic Malware Now Steals Login Credentials
The TgToxic Android malware, first found in July 2022, has been updated to better steal login credentials and financial data. Initially targeting Southeast Asia through phishing and fake apps, it [...]
Linux Systems Under Attack: New Auto-Color Malware Grants Remote Access
Palo Alto Networks researchers have discovered a new Linux malware, "Auto-Color," which poses a serious threat due to its advanced evasion methods and ability to give attackers full remote access [...]
Google Warns of Phishing Attacks on Higher Education Institutions
Google and Mandiant warn of rising phishing attacks on U.S. higher education, exploiting academic schedules and institutional trust since August 2024. All about the attack These phishing attacks, active since [...]
Sliver C2 Server Flaw Enables TCP Hijacking and Data Interception
A critical flaw (CVE-2025-27090) in the Sliver C2 server allows attackers to hijack TCP connections using SSRF, enabling traffic interception and manipulation. Sliver C2 Server Flaw The vulnerability impacts Sliver [...]
Get Social