ClickCease Cybersecurity News Archives - Page 44 of 52 - TuxCare

Google launches free vulnerability scanner...

Google has launched OSV-Scanner, a free tool for open-source developers to easily access vulnerability information. It is said to include an interface to the OSV database which links a project’s...

VMware patches three vulnerabilities during...

VMware has released patches for a number of vulnerabilities, including a virtual machine escape flaw, CVE-2022-31705, which was exploited during the GeekPwn 2022 hacking challenge, as part of this month’s...

APT5 exploits unauthenticated remote code...

The U.S. National Security Agency has warned that a Chinese state-sponsored group is exploiting an unauthenticated remote code execution flaw (CVE-2022-27518) to compromise Citrix Application Delivery Controller (ADC) deployments. According...

Supply chain vulnerabilities put server...

Eclypsium Research has identified and reported three vulnerabilities in American Megatrends, Inc. (AMI) MegaRAC Baseboard Management Controller (BMC) software. This is used by AMD, Ampere, Asrock, Asus, Arm, Dell, Gigabyte, HPE,...

APT37 spread malware to South...

Google’s Threat Analysis Group discovered APT37, also known as Scarcruft or Reaper, a North Korean-linked hacking group, exploiting a zero-day vulnerability in Internet Explorer’s JScript engine by delivering malicious Microsoft...

Drokbk malware allegedly target American...

According to Secureworks Counter Threat Unit researchers, the Drokbk malware has been targeting the networks of several local governments in the United States since February. Cobalt Mirage, also known as...

Zombinder malware imitates original apps...

ThreatFabric researchers have discovered the Zombinder service, which allows cybercriminals to easily embed malware into legitimate apps and steal data while also wreaking havoc on the device. In a bid...

MSP remote access tool sent...

Deep Instincts researchers have uncovered a hacker group known as MuddyWater, which has been linked to Iran’s Ministry of Intelligence and Security and typically engages in covert operations operations targeting...

Eufy’s camera streams URLs offers...

Eufy denies claims that its cameras can be live streamed without encryption. Eufy stated that it does not upload identifiable footage to the cloud from its camera streams using VLC...

Android users at risk over...

A number of digital certificates used by vendors such as Samsung, LG, and MediaTek have been discovered to be compromised in order to stamp approval on malicious Android apps, rendering...

Trio of new flaws exploited...

Vedere Labs researchers recently discovered three new security flaws in a long list of flaws collectively tracked as OT:ICEFALL. The flaws are said to affect operational technology (OT) products from...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter