From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware

Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan.The starting point of the attack is a...

Sudo vulnerability allows attackers to gain root privileges on Linux systems

A weakness (CVE-2021-3156) in sudo, an incredible and close pervasive open-source utility utilized on significant Linux and Unix-like working frameworks, could permit any unprivileged...

Attackers Steals $2 million from cryptocurrency service

  Attackers Steals $2 million from cryptocurrency service “Cryptocurrency service Akropolis suffered a “Flash Loan” Attack” Cryptocurrency borrowing and lending service Akropolis stated that a hacker used...

Hackney council hit by cyber attack

Committee has been hit by a digital assault which is influencing a considerable lot of its administrations and IT frameworks, the gathering has said. Civic...

Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included

Microsoft has released security updates for the month of April 2024 to remediate a record 149 flaws, two of which have come under active...

NSA Admits Secretly Buying Your Internet Browsing Data without Warrants

The U.S. National Security Agency (NSA) has admitted to buying internet browsing records from data brokers to identify the websites and apps Americans use...

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks

Cybersecurity researchers have found that it's possible to compromise the Hugging Face Safetensors conversion service to ultimately hijack the models submitted by users and...

Cyber frauds has cost Russia $49 billion this year

Cyber attacks have cost Russian companies and citizens up to three .6 trillion roubles ($49 billion) this year, the country’s largest lender Sberbank said. Russia...

Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware

Threat actors have been leveraging fake websites advertising popular video conferencing software such as Google Meet, Skype, and Zoom to deliver a variety of...

What is Nudge Security and How Does it Work?

In today's highly distributed workplace, every employee has the ability to act as their own CIO, adopting new cloud and SaaS technologies whenever and...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts