vulnerability

Telegram offers fix to its non encrypted chat vulnerability

Telegram made it official that it has offered a security fix to non-encrypted chats that were previously vulnerable to cyber attacks through manipulated bots. The chat services provider announced that the fix will be rolled in an automated manner and expects to put an end to all media speculations that its ‘Secret Chat’ feature that […]

Vulnerability makes hackers hijack video streams from millions of connected cameras

A recent study made by Nozomi Networks, a security company that offers solutions for IoT products has discovered that millions of connected cameras are on the verge of being hijacked by cyber crooks through a vulnerability. Security researchers say that the flaw is related to software component used in cloud surveillance platform ThroughTek that is […]

Dell new vulnerability puts over 30 million users at risk

A new vulnerability/s discovered by security researchers has reportedly put over 30 million Dell PC users at risk. It is a chain of 4 bugs that have been assigned a cumulative CVSS score of 8.4 which is high/severe. Eclypsium, a Cybersecurity vendor, was the first to discover these vulnerabilities in over 129 Dell Models that […]

Qualcomm Chip vulnerability encourages Malware attacks on Android Users

Android users, especially those using high-end phones manufactured by Google, Samsung, LG, Xiaomi, OnePlus, and Samsung you better be aware of this intense cyber threat. Security researchers from Counterpoint Research have discovered a vulnerability in Qualcomm Chips being operated in some of the high-end smart phones that when exploited could lead to malware attacks and […]

Security Vulnerabilities in Dell Laptops

Dell Laptops are said to be exhibiting some vulnerabilities in their software that hackers could exploit to gain remote access say security experts from Sentinel Labs. Report released by the firm says that the discovered flaw is actually an amalgamation of 5 different flaws that are present on the Dell BIOS Utility Driver called DBUtil […]

Tata Consultancy offers SaaS platform to detect software security vulnerabilities

Tata Consultancy Services (TCS), an IT giant from India, has launched Software as a service (SaaS) platform for companies to protect their software libraries against cyber attacks occurring through software vulnerabilities. The service will be an automated model and will act as a remediation platform that is contextual; risk focused and will act as an […]

VMware vulnerability causes increase in ransomware attacks

All the corporate networks out there you better be aware of the incident where ransomware spreading threat actors are seen exploiting the vulnerabilities of VMware ESXi software. RansomExx Gang is seen exploiting CVE-2019-5544 and CVE-2020-3992 virtual software infecting the machines on the network with the file encrypting malware. So, companies using the said software are […]

Positive Technologies helps eliminate DoS vulnerability in F5 BIG-IP application delivery controller

Framingham, MA (January 14, 2020) — F5 has fixed a vulnerability in the configuration interface of the popular BIG-IP application delivery controller. The bug, discovered by Positive Technologies expert Nikita Abramov, affected a product that is used by some of the world’s leading companies, and would allow remote hackers to cause denial of service attacks to the controller.   Vulnerability CVE-2020-27716 received a CVSS score of […]

Google discovers vulnerability in iPhone that lets hackers steal data

Google has discovered a vulnerability in iPhones that might allow the hackers to engage in data stealing activity, say an expert working on the prestigious Project Zero. Ian Beer is the researcher in discussion who exploited an Apple Wireless Direct Link (AWDL) Protocol that allows data steal from iPhone and live- spying through the targeted […]

Zero day vulnerability in Windows OS and Internet Explorer exploited

A research carried out by Kaspersky Labs has confirmed that hackers recently launched a cyber attack on a South Korean company by leveraging a zero-day vulnerability in Microsoft’s Internet Explorer(IE) and Windows 10 Operating system. An analysis made by the security researchers at a later stage found that the cyber crooks exploited the Elevation of […]

Share this page