Category vulnerabilities

New 5G Modem Vulnerabilities Impact iOS and Major Android Devices

Recent research has unveiled a series of critical security vulnerabilities within the firmware of 5G mobile network modems manufactured by major semiconductor companies, notably MediaTek and Qualcomm. These vulnerabilities affect a range of devices, including USB and Internet of Things (IoT) modems, as well as hundreds of smartphone models operating…

Read MoreNew 5G Modem Vulnerabilities Impact iOS and Major Android Devices

Lazarus Group Leverages Log4j Vulnerabilities for Remote Access Trojan Deployment

The Lazarus Group, a North Korean cybercriminal entity, has launched a significant global campaign leveraging vulnerabilities in Log4j to facilitate the deployment of previously unknown remote access trojans (RATs). This operation, termed “Operation Blacksmith” by Cisco Talos, employs a range of malware families written in DLang, notably including a RAT…

Read MoreLazarus Group Leverages Log4j Vulnerabilities for Remote Access Trojan Deployment

New Critical RCE Vulnerability Identified in Apache Struts 2 – Update Immediately

Apache Software Foundation has issued a security advisory regarding a critical vulnerability within the Struts 2 open-source web application framework, posing a significant risk for remote code execution (RCE). This vulnerability, designated as CVE-2023-50164, stems from inadequate “file upload logic” that permits unauthorized path traversal. If exploited, attackers can upload…

Read MoreNew Critical RCE Vulnerability Identified in Apache Struts 2 – Update Immediately

Apple Issues Security Updates to Address Critical Vulnerabilities in iOS and macOS

On Monday, Apple unveiled a series of security updates across its platforms, including iOS, iPadOS, macOS, tvOS, watchOS, and Safari, aimed at rectifying numerous vulnerabilities while also backporting critical fixes for two recently identified zero-day flaws affecting older devices. The updates address 12 significant security vulnerabilities in iOS and iPadOS.…

Read MoreApple Issues Security Updates to Address Critical Vulnerabilities in iOS and macOS

New Security Flaws Discovered in pfSense Firewall Software – Update Immediately

Recent findings have uncovered multiple security vulnerabilities within the open-source Netgate pfSense firewall solution. These vulnerabilities could potentially be combined by an attacker, allowing them to execute arbitrary commands on affected devices. The identified issues involve two reflected cross-site scripting (XSS) issues alongside a command injection vulnerability, as reported by…

Read MoreNew Security Flaws Discovered in pfSense Firewall Software – Update Immediately

Caution: Experts Uncover Fresh Insights on Zero-Click Outlook RCE Vulnerabilities

Recent findings have revealed two security vulnerabilities in Microsoft Windows that have since been patched but could have been exploited by attackers to carry out remote code execution (RCE) on Outlook email clients without any user intervention. This information was disclosed by Akamai researcher Ben Barnea, who discovered the flaws…

Read MoreCaution: Experts Uncover Fresh Insights on Zero-Click Outlook RCE Vulnerabilities

Urgent: New Chrome Zero-Day Vulnerability Actively Exploited – Immediate Update Required

Google has issued critical security updates for its Chrome web browser following the identification of a severe zero-day vulnerability. This flaw, labeled as CVE-2023-7024, has already been exploited in active attacks, prompting urgent measures from the tech giant. Described as a heap-based buffer overflow error within the WebRTC framework, this…

Read MoreUrgent: New Chrome Zero-Day Vulnerability Actively Exploited – Immediate Update Required

Hackers Taking Advantage of MS Excel Vulnerability to Distribute Agent Tesla Malware

Recent cybersecurity threats have revealed that attackers are exploiting an aging vulnerability in Microsoft Office as a tactic within phishing campaigns. This method is being employed to disseminate a malware variant known as Agent Tesla. The infection vector often involves decoy Excel files, which are typically embedded in messages that…

Read MoreHackers Taking Advantage of MS Excel Vulnerability to Distribute Agent Tesla Malware

UAC-0099: Leveraging WinRAR Vulnerabilities to Attack Ukrainian Companies with LONEPAGE Malware

The threat actor identified as UAC-0099 has intensified its campaign targeting Ukraine, utilizing a critical vulnerability in the WinRAR software to distribute the malware variant known as LONEPAGE. This method highlights a significant shift in tactics, emphasizing the exploitation of existing software vulnerabilities to facilitate attacks. According to cybersecurity firm…

Read MoreUAC-0099: Leveraging WinRAR Vulnerabilities to Attack Ukrainian Companies with LONEPAGE Malware