Monday, February 24, 2025

Security News

HP Released Security Updates For Critical Remote Code Execution With Inkjet Printers

HP released security updates for two critical Remote Code Execution vulnerabilities with HP Inkjet Printers. The vulnerability can be tracked as CVE-2018-5924 and CVE-2018-5925.The...

Beware !! Hackers Deliver FlawedAmmyy RAT via Weaponized Microsoft Word and PDF Documents

Cybercriminals spreading powerful FlawedAmmyy RAT via Weaponized Microsoft Word and PDF Attachments to spy victims device and steal the sensitive information Remotely.Hackers always lookout...

Top Cybercrime Tactics and Techniques Q2 2018 Cryptomining, GrandCrab, SamSam & VPNFilter

Malwarebytes published reports on Cybercrime tactics and techniques shows the new developments in ransomware and cryptomining attacks. When compared to Q1 the Q2 attacks...

Dark Web Drug Vendor Pleads Guilty After Federal Authorities Seized his Bitcoin Worth Nearly $1 Million

Gal Vallerius a 36-year-old Frenchman pleaded guilty in Miami federal court, he was a well-known drug vendor by his alias name "OxyMonster" on the...

Hackers Mined Monero Worth $90000 by Pushing 17 Malicious Images to a Docker Hub

Cryptomining attacks are increasing rapidly, attackers use to compromise servers, personal computers, Chrome extensions and web portals to mine cryptocurrencies such as Monero.Attackers made...

VMware Released Security Updates for Critical Remote Code Execution Vulnerability

VMware security updates published for its AirWatch Agent that affected by critical remote code execution vulnerability.VMware is a virtualization software which is installed on...

Microsoft Released Critical Security Updates with Patch for 50 Critical Vulnerabilities

Microsoft security updates released for June 2018 contains fixes for more than 50 vulnerabilities including for some of the products Critical remote code execution...

macOS Signature Validation Flaw Allows a Malicious Code Appeared to be Signed by Apple

A flaw in third-party macOS APIs could allow attackers to impersonate the malicious programs to be signed by Apple. The vulnerability affects many vendors...