vulnerability

Security vulnerability in IT infrastructure of Ransomware gang saves six victimized companies

Recent news has frequently highlighted how vulnerabilities in a company’s IT infrastructure can lead to devastating cyber-attacks. However, an intriguing twist has emerged: a flaw in the infrastructure managed by a ransomware group has led to a dramatic near-miss where six companies were spared from hefty ransomware payments. Vangelis Stykas, CTO of Atropos.ai, which specializes […]

Breaking the Cycle of Traditional Vulnerability Management

As our reliance on technology continues to grow, so does the sophistication and prevalence of cyber threats. And with each technological advancement, new vulnerabilities and attack vectors emerge, posing significant risks to individuals, and organizations alike. Many organizations have implemented vulnerability management processes to protect against these evolving threats, however, traditional approaches are growing increasingly […]

Indian government reports Security Vulnerabilities in Apple devices

The Indian government has released a report highlighting security vulnerabilities in Apple devices. The Computer Emergency Response Team of India (CERT-IN) has issued an urgent alert, identifying security threats affecting a range of Apple products, including iPhones, iPads, Apple Watches, iMacs, MacBooks, and the Safari Browser. These vulnerabilities stem from software flaws. CERT-IN, operating under […]

Vulnerability Comparison: Android vs. iOS in the Face of Cyber Attacks

In the digital age, where smartphones have become an inseparable part of our lives, concerns about cybersecurity have risen to the forefront. Two major players in the smartphone market, Android, and iOS, stand out due to their extensive user base and unique features. However, the debate over which operating system is more vulnerable to cyber-attacks […]

ChatGPT users data leaked because of bug vulnerability

OpenAI-developed ChatGPT has hit the news headlines because user information has been leaked on the web by some threat actors who claim to have accessed and stolen data from the database of the OpenAI platform via a bug vulnerability. As a result, credit card details, the last 4 digits of credit card numbers, credit card […]

Cyber Attack news headlines trending on Google

1) Indian Computer Emergency Response Team (CERT-In) has given an update that all those who are using Adobe products and services should be cautious, as hackers can easily hack their systems by exploiting multiple vulnerabilities in the software. According to CERT-In, the attacker can gain access to admin privileges, execute arbitrary codes and write arbitrary […]

Microsoft issues serious alert about Follina Vulnerability

Microsoft has issued a serious alert against Follina Vulnerability and claims to have released a fix and is urging users to upgrade it on a quicker note. The flaw seems to be critical, as it can give a chance to hackers access personal data from a device. Follina is a kind of remote code execution […]

Vulnerabilities on UNISOC Processors loaded Android Phones

All those who are using an Android phone running on a UNISOC chipset are being warned that their devices are vulnerable to remote attacks where the cyber crooks can block or intercept communications to manipulate thereafter. UNISOC is one of china’s mobile processor manufacturers and the component is used on millions of smartphones that are […]

Industrial Open Automation Software filled with vulnerabilities

Cisco Talos has discovered that Industrial Open Automation Software (OAS) that is used to operate Industrial Control Systems (ICS) is filled with critical vulnerabilities that are yet to be patched. As OAS acts as a bridge for the data movement between two different industrial platforms like PLCs, applications, IoT devices, and databases, these systems play […]

Hackers pay a $5000 monthly fee to gain fraudulent access to banking apps

A research group from ESET has discovered that cyber-crooks are paying a monthly fee of $5000 to gain fraudulent access to 467 android apps to steal banking-related details. Information is out that the campaign has been running for quite some time and is aiming to siphon cryptocurrencies along with fiat. Dubbed an ERMAC banking Trojan, […]

Share this page