vulnerability

Details about Microsoft Azure Cosmos DB vulnerability

Customers using Microsoft Azure cloud platform for their application needs are being warned against a new vulnerability that has been discovered recently by a security company named WIZ. The Cybersecurity firm has named the Cosmos DB vulnerability as ChaosDB vulnerability and warned that the flaw could have exposed content related to thousands of Azure clients […]

Telegram offers fix to its non encrypted chat vulnerability

Telegram made it official that it has offered a security fix to non-encrypted chats that were previously vulnerable to cyber attacks through manipulated bots. The chat services provider announced that the fix will be rolled in an automated manner and expects to put an end to all media speculations that its ‘Secret Chat’ feature that […]

Vulnerability makes hackers hijack video streams from millions of connected cameras

A recent study made by Nozomi Networks, a security company that offers solutions for IoT products has discovered that millions of connected cameras are on the verge of being hijacked by cyber crooks through a vulnerability. Security researchers say that the flaw is related to software component used in cloud surveillance platform ThroughTek that is […]

Dell new vulnerability puts over 30 million users at risk

A new vulnerability/s discovered by security researchers has reportedly put over 30 million Dell PC users at risk. It is a chain of 4 bugs that have been assigned a cumulative CVSS score of 8.4 which is high/severe. Eclypsium, a Cybersecurity vendor, was the first to discover these vulnerabilities in over 129 Dell Models that […]

Qualcomm Chip vulnerability encourages Malware attacks on Android Users

Android users, especially those using high-end phones manufactured by Google, Samsung, LG, Xiaomi, OnePlus, and Samsung you better be aware of this intense cyber threat. Security researchers from Counterpoint Research have discovered a vulnerability in Qualcomm Chips being operated in some of the high-end smart phones that when exploited could lead to malware attacks and […]

VMware vulnerability causes increase in ransomware attacks

All the corporate networks out there you better be aware of the incident where ransomware spreading threat actors are seen exploiting the vulnerabilities of VMware ESXi software. RansomExx Gang is seen exploiting CVE-2019-5544 and CVE-2020-3992 virtual software infecting the machines on the network with the file encrypting malware. So, companies using the said software are […]

Vulnerability in the 5G network make mobile phones susceptible to eavesdropping

As the world is preparing to make a shift from 4G to 5G network, researchers from the Horst Gortz Institute for IT Security (HGI) based in the Ruhr University of Bochum, Germany have revealed that phone calls on 4G network are susceptible to eavesdropping that can also be carry forwarded to the setup of 5G […]

Conduent ransomware attack and its Citrix Server Vulnerability

Conduent, a Business Process services company headquartered in New Jersey, America was reportedly hit by a ransomware attack on May 29th,2020. The company has confirmed the attack and said that the incident was contained in 9 hours( starting from12:45 am CET to 10:00 am CET) before the systems were brought online from backups, but failed […]

Android phones come with pre-installed vulnerabilities

A new study made by security firm Kryptowire states that Android Phones are coming with pre-installed vulnerabilities that could impact smartphone users in a severe way. This Virginia based startup which offers Mobile Enterprise Security solutions says that such vulnerabilities don’t require a user to download malicious apps as they come already installed on the […]

Intel ZombieLoad vulnerability might expose sensitive data like passwords to hackers

Intel has made an official announcement that all those processors manufactured by the company after 2011 are now vulnerable to ZombieLoad flaw which can expose sensitive data like passwords to hackers- similar to the ones seen in Meltdown and Spectre Vulnerabilities. As per the security analysts, ZombieLoad flaw is critical and operates by exploiting design […]

Share this page