Tag Google

Patch Released for Mali GPU Kernel Driver Vulnerability Addressing Ongoing Exploitation of Arm Issues

Arm has recently issued critical security patches to address a vulnerability in the Mali GPU Kernel Driver, which has been actively exploited in the field. This security flaw, designated as CVE-2023-4211, affects multiple driver versions, including the Midgard, Bifrost, and Valhall GPU Kernel Drivers across a range of versions. The…

Read MorePatch Released for Mali GPU Kernel Driver Vulnerability Addressing Ongoing Exploitation of Arm Issues

Apple Releases Security Updates to Address Actively Exploited iOS Zero-Day Vulnerability

On Wednesday, Apple released critical security updates aimed at mitigating a recently identified zero-day vulnerability in both iOS and iPadOS. This flaw, designated as CVE-2023-42824, is reportedly being exploited in the wild, raising alarm for users and businesses alike. The vulnerability exists within the kernel and can be exploited by…

Read MoreApple Releases Security Updates to Address Actively Exploited iOS Zero-Day Vulnerability

Alert: New Phishing Scheme Targeting Even the Most Cautious Users

In a concerning trend, cybercriminals are employing increasingly sophisticated phishing techniques that can easily deceive even the most vigilant online users. A recent report highlighted how these malicious actors are capitalizing on the common practice of logging into websites via social media accounts, specifically focusing on services like Facebook. Antoine…

Read More

Alert: New Phishing Scheme Targeting Even the Most Cautious Users

HTTP/2 Rapid Reset Zero-Day Vulnerability Used to Execute Record-Breaking DDoS Attacks

In a concerning escalation of cybersecurity threats, Amazon Web Services (AWS), Cloudflare, and Google reported significant progress in defending against unprecedented distributed denial-of-service (DDoS) attacks that utilize a new exploit known as HTTP/2 Rapid Reset. This emerging vulnerability has raised alarms due to its ability to launch large-scale attacks efficiently.…

Read MoreHTTP/2 Rapid Reset Zero-Day Vulnerability Used to Execute Record-Breaking DDoS Attacks

US Indicts Two Russian Spies and Two Hackers for Breaching 500 Million Yahoo Accounts

U.S. Charges Russian Intelligence Officers and Hackers in 2014 Yahoo Data Breach In a significant development in cybersecurity, U.S. authorities have charged two Russian intelligence officers and two hackers linked to the massive 2014 Yahoo data breach, which affected over 500 million user accounts. The U.S. Department of Justice disclosed…

Read MoreUS Indicts Two Russian Spies and Two Hackers for Breaching 500 Million Yahoo Accounts

Pro-Russian Hackers Target Recent WinRAR Vulnerability in Latest Attack Campaign

Recent reports indicate that pro-Russian hacking groups are exploiting a security vulnerability in WinRAR, a widely used archiving software. This vulnerability has been employed in a phishing campaign aimed at credential theft from compromised systems, raising significant security concerns among business owners. The vulnerability in question, known as CVE-2023-38831, affects…

Read MorePro-Russian Hackers Target Recent WinRAR Vulnerability in Latest Attack Campaign

How to Safeguard Your iPhone or Android Device Against Spyware

Recent findings have unveiled alarming trends in the cybersecurity landscape, particularly in the emergence of spyware that exploits seemingly innocuous applications and tools. Richard LaTulip, a field Chief Information Security Officer at Recorded Future, highlights that infections often initiate through malicious links or counterfeit applications, but increasingly, they are being…

Read MoreHow to Safeguard Your iPhone or Android Device Against Spyware

Russian Hackers Introduce ‘Tainted Leaks’ – From Phishing to Propaganda

Recent findings reveal a sophisticated disinformation campaign aimed at discrediting critics of the Russian state while compromising sensitive data. Security researchers have linked these activities to a suspected Russian government-sponsored espionage initiative, though definitive evidence of state involvement remains unproven. Notably, these operations share characteristics with the tactics employed by…

Read MoreRussian Hackers Introduce ‘Tainted Leaks’ – From Phishing to Propaganda

European Parliament Moves to Prohibit Encryption Backdoors

In a significant development, Prime Minister Theresa May is advocating for technology companies, including major players like Facebook, Apple, and Google, to implement controversial ‘backdoors’ that would enable law enforcement access. However, she is aware that the concept is rife with complexities that extend beyond mere implementation. The European Parliament’s…

Read MoreEuropean Parliament Moves to Prohibit Encryption Backdoors