vulnerability

Telegram offers fix to its non encrypted chat vulnerability

Telegram made it official that it has offered a security fix to non-encrypted chats that were previously vulnerable to cyber attacks through manipulated bots. The chat services provider announced that the fix will be rolled in an automated manner and expects to put an end to all media speculations that its ‘Secret Chat’ feature that […]

Vulnerability makes hackers hijack video streams from millions of connected cameras

A recent study made by Nozomi Networks, a security company that offers solutions for IoT products has discovered that millions of connected cameras are on the verge of being hijacked by cyber crooks through a vulnerability. Security researchers say that the flaw is related to software component used in cloud surveillance platform ThroughTek that is […]

Dell new vulnerability puts over 30 million users at risk

A new vulnerability/s discovered by security researchers has reportedly put over 30 million Dell PC users at risk. It is a chain of 4 bugs that have been assigned a cumulative CVSS score of 8.4 which is high/severe. Eclypsium, a Cybersecurity vendor, was the first to discover these vulnerabilities in over 129 Dell Models that […]

Qualcomm Chip vulnerability encourages Malware attacks on Android Users

Android users, especially those using high-end phones manufactured by Google, Samsung, LG, Xiaomi, OnePlus, and Samsung you better be aware of this intense cyber threat. Security researchers from Counterpoint Research have discovered a vulnerability in Qualcomm Chips being operated in some of the high-end smart phones that when exploited could lead to malware attacks and […]

Security Vulnerabilities in Dell Laptops

Dell Laptops are said to be exhibiting some vulnerabilities in their software that hackers could exploit to gain remote access say security experts from Sentinel Labs. Report released by the firm says that the discovered flaw is actually an amalgamation of 5 different flaws that are present on the Dell BIOS Utility Driver called DBUtil […]

Tata Consultancy offers SaaS platform to detect software security vulnerabilities

Tata Consultancy Services (TCS), an IT giant from India, has launched Software as a service (SaaS) platform for companies to protect their software libraries against cyber attacks occurring through software vulnerabilities. The service will be an automated model and will act as a remediation platform that is contextual; risk focused and will act as an […]

VMware vulnerability causes increase in ransomware attacks

All the corporate networks out there you better be aware of the incident where ransomware spreading threat actors are seen exploiting the vulnerabilities of VMware ESXi software. RansomExx Gang is seen exploiting CVE-2019-5544 and CVE-2020-3992 virtual software infecting the machines on the network with the file encrypting malware. So, companies using the said software are […]

Positive Technologies helps eliminate DoS vulnerability in F5 BIG-IP application delivery controller

Framingham, MA (January 14, 2020) — F5 has fixed a vulnerability in the configuration interface of the popular BIG-IP application delivery controller. The bug, discovered by Positive Technologies expert Nikita Abramov, affected a product that is used by some of the world’s leading companies, and would allow remote hackers to cause denial of service attacks to the controller.   Vulnerability CVE-2020-27716 received a CVSS score of […]

Zero day vulnerability in Windows OS and Internet Explorer exploited

A research carried out by Kaspersky Labs has confirmed that hackers recently launched a cyber attack on a South Korean company by leveraging a zero-day vulnerability in Microsoft’s Internet Explorer(IE) and Windows 10 Operating system. An analysis made by the security researchers at a later stage found that the cyber crooks exploited the Elevation of […]

Vulnerability in the 5G network make mobile phones susceptible to eavesdropping

As the world is preparing to make a shift from 4G to 5G network, researchers from the Horst Gortz Institute for IT Security (HGI) based in the Ruhr University of Bochum, Germany have revealed that phone calls on 4G network are susceptible to eavesdropping that can also be carry forwarded to the setup of 5G […]

Share this page