Home Security Vulnerability

Vulnerability

Kaspersky Lab

Kaspersky Lab Discovered A SessionManager Backdoor That Hackers Used To Spy On Government Agencies...

0
Kaspersky Lab security experts discovered malicious malware that spied on the official websites of many government bodies and non-profit organizations throughout the world.According to the press release, the hidden SessionManager backdoor is present on 34...
Microsoft Windows Defender news and stories

Windows Defender Significantly Reduces The Performance Of Intel Processors In Windows 10 Or 11

0
Windows Defender, built-in security solution of the Windows operating system, slows down PCs based on 8th and 11th generation Intel processors. The problem was discovered by Kevin Glynn, associate software author behind popular utilities such as...
PACMAN attack in M1

PACMAN: MIT Researchers Able To Bypass The Last Layer Of Protection In Apple M1...

0
Researchers at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at the Massachusetts Institute of Technology (MIT) have discovered a type of attack called PACMAN that exploits a hardware vulnerability in Apple M1 series chips.The attack was...
Android malware and adware news

Apple Codec Vulnerability In Qualcomm And Mediatek SoCs Risks Millions Of Android Devices

0
Check Point security researchers discovered a flaw in devices equipped with Qualcomm and MediaTek chipsets that may have allowed hackers to take control of millions of Android smartphones.According to Check Point Research team, this is a...
Apple Safari browser news

A Vulnerability In Apple’s Safari Leaks Visited Websites And User IDs

0
Researchers have found a vulnerability in Apple's Safari 15 browser, which allows websites to spy on browsing activity or other personal information. The anomalous behavior was identified by FingerpintJS, a browser fingerprinting service.The problem lies...
Log4j Log4Shell vulnerabilit

Log4Shell: Log4j Vulnerability Threatens Cybersecurity Worldwide

0
The recently discovered vulnerability known as Log4Shell is currently causing chaos on the internet, as cyber defenders try to fix the flaw while cybercriminals try to exploit its weaknesses and steal information.The Log4Shell vulnerability...
Microsoft's Windows Subsystem For Linux

Security Experts Discovered Malware Intended For Windows Subsystem For Linux

0
Lumen's Black Lotus Labs, which specialize in network security, report on their blog about malware that was written in Python and created as a Linux ELF binary. What makes it special is that this malware is...
BrakTooth Vulnerabilities

BrakTooth Vulnerabilities In Various Bluetooth SoCs Put Billions Of Devices At Risk

0
Security researchers at the Singapore University of Technology and Design have found 16 security flaws in commercially used Bluetooth stack implementations, which they summarize under the name "Braktooth". According to researchers, these vulnerabilities in the Bluetooth Classic...