vulnerability
Apple iPhone Users Warned About Data-Stealing Vulnerability in TCC Feature
Apple iPhone users are being alerted to a critical security flaw that could potentially allow hackers to steal sensitive data. This vulnerability exists within the Transparency, Consent, and Control (TCC) feature of Apple’s operating system, posing serious risks to user privacy. Security researchers have identified that this bug enables cybercriminals to bypass notification alerts, potentially […]
Security vulnerability in IT infrastructure of Ransomware gang saves six victimized companies
Recent news has frequently highlighted how vulnerabilities in a company’s IT infrastructure can lead to devastating cyber-attacks. However, an intriguing twist has emerged: a flaw in the infrastructure managed by a ransomware group has led to a dramatic near-miss where six companies were spared from hefty ransomware payments. Vangelis Stykas, CTO of Atropos.ai, which specializes […]
Breaking the Cycle of Traditional Vulnerability Management
As our reliance on technology continues to grow, so does the sophistication and prevalence of cyber threats. And with each technological advancement, new vulnerabilities and attack vectors emerge, posing significant risks to individuals, and organizations alike. Many organizations have implemented vulnerability management processes to protect against these evolving threats, however, traditional approaches are growing increasingly […]
Indian government reports Security Vulnerabilities in Apple devices
The Indian government has released a report highlighting security vulnerabilities in Apple devices. The Computer Emergency Response Team of India (CERT-IN) has issued an urgent alert, identifying security threats affecting a range of Apple products, including iPhones, iPads, Apple Watches, iMacs, MacBooks, and the Safari Browser. These vulnerabilities stem from software flaws. CERT-IN, operating under […]
Vulnerability Comparison: Android vs. iOS in the Face of Cyber Attacks
In the digital age, where smartphones have become an inseparable part of our lives, concerns about cybersecurity have risen to the forefront. Two major players in the smartphone market, Android, and iOS, stand out due to their extensive user base and unique features. However, the debate over which operating system is more vulnerable to cyber-attacks […]
ChatGPT users data leaked because of bug vulnerability
OpenAI-developed ChatGPT has hit the news headlines because user information has been leaked on the web by some threat actors who claim to have accessed and stolen data from the database of the OpenAI platform via a bug vulnerability. As a result, credit card details, the last 4 digits of credit card numbers, credit card […]
Cyber Attack news headlines trending on Google
1) Indian Computer Emergency Response Team (CERT-In) has given an update that all those who are using Adobe products and services should be cautious, as hackers can easily hack their systems by exploiting multiple vulnerabilities in the software. According to CERT-In, the attacker can gain access to admin privileges, execute arbitrary codes and write arbitrary […]
Microsoft issues serious alert about Follina Vulnerability
Microsoft has issued a serious alert against Follina Vulnerability and claims to have released a fix and is urging users to upgrade it on a quicker note. The flaw seems to be critical, as it can give a chance to hackers access personal data from a device. Follina is a kind of remote code execution […]
Vulnerabilities on UNISOC Processors loaded Android Phones
All those who are using an Android phone running on a UNISOC chipset are being warned that their devices are vulnerable to remote attacks where the cyber crooks can block or intercept communications to manipulate thereafter. UNISOC is one of china’s mobile processor manufacturers and the component is used on millions of smartphones that are […]
Industrial Open Automation Software filled with vulnerabilities
Cisco Talos has discovered that Industrial Open Automation Software (OAS) that is used to operate Industrial Control Systems (ICS) is filled with critical vulnerabilities that are yet to be patched. As OAS acts as a bridge for the data movement between two different industrial platforms like PLCs, applications, IoT devices, and databases, these systems play […]