Description A cross-platform botnet that is primarily designedto perform distributed denial-of-service (DDoS) attacks against personal Minecraft serv . . . Read more
Description A critical zero-day vulnerability was spotted in Citrix Application Delivery Controller (ADC) and Gateway that is being actively exploit . . . Read more
Description Threat actors can attach malware to trustworthy Android apps via the darknet platform known as “Zombinder,” leading victims t . . . Read more
Description Recently discovered malware called Zerobot was spotted in November exploiting twenty-one (21) vulnerabilities in various Internet of Thi . . . Read more
Description Hackers are utilizing BYOF (Bring Your Own Filesystem) assaults to take advantage of the open-source Linux PRoot utility and offer a con . . . Read more
Description Three vulnerabilities were found and reported in American Megatrends MegaRAC Baseboard Management Controller (BMC) firmware that puts ma . . . Read more
Description Some new malicious android apps were recently discovered to have infiltrated Google Play store, infecting devices with malware, adware a . . . Read more
Description Googles Threat Analysis group (TAG) has recently linked a commercial surveillance company to an exploit framework that targets zero . . . Read more
Description The Quarkus Java framework has been found to have a serious security flaw that might be used to execute remote code on vulnerable system . . . Read more
Description A recent discovery from the cyber security firm JFrog related that an unexpected behaviour in npms Command Line Interface (CLI) can lead . . . Read more
Description Multiple laptop models were affected by a high-severity vulnerability patched by Acer that would have allowed local attackers to disable . . . Read more
Description Google Ads are being used by a growing threat activity cluster in one of its attempts to disseminate numerous post-compromise payloads, i . . . Read more