Apple fixes bug that breaks iPhone WiFi when joining rogue hotspots

Apple has rolled out security updates to address dozens of iOS and macOS vulnerabilities, including a severe iOS bug dubbed WiFiDemon that could lead to denial of service or arbitrary code execution.

AvosLocker enters the ransomware scene, asks for partners

Avos is a relatively new ransomware, that was observed in late June and early July. Its authors announced recruitment for “pentesters with Active Directory network experience" and “access brokers."

MacOS malware steals Telegram accounts, Google Chrome data

Security researchers have published details about the method used by a strain of macOS malware to steal login information from multiple apps, enabling its operators to steal accounts.

Dozens of web apps vulnerable to DNS cache poisoning via ‘forgot password’ feature

In a study of 146 web applications, Timo Longin, security researcher at SEC Consult, found misconfigurations that malicious actors could exploit to redirect password reset emails to their own servers.

Microsoft warns over this unusual malware that targets Windows and Linux

The LemonDuck malware is targeting both Windows and Linux systems via phishing emails, exploits, USB devices, and brute force attacks, as well as critical on-premise Exchange Server vulnerabilities.

These are the most dangerous and most common software vulnerabilities to watch out for

MITRE releases a list of its top 25 most dangerous software weaknesses, detailing the most common vulnerabilities which can give cybercriminals access to machines to steal data or cause crashes.

Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances

Analysts with cybersecurity company Intezer have found that cybercriminals are now going after a new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances.

iOS Security Update Patches Recently Disclosed Wi-Fi Vulnerability

Apple this week rolled out security updates for iOS, macOS, iPadOS, watchOS, tvOS, and Safari, to address tens of vulnerabilities, including some that could result in arbitrary code execution.

Taurus Loader: User-Guided Infection

In recent months Minerva Labs researchers have seen a spike in events associated with Taurus loader. Its spreading method allows it to generate new samples and infect new devices continuously.

Dozens of Malware on Pulse Secure Devices Targeting U.S. Organizations

Dozens of Malware on Pulse Secure Devices Targeting U.S. Organizations - Cybersecurity news - Malware and Vulnerabilities
The CISA warned against 13 malware samples found on exploited Pulse Secure devices that went largely undetected by antivirus products. These were reportedly targeting U.S. government agencies, critical infrastructure entities, and private sector organizations. The federal agency has released I ... Read More

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags