Jun 30, 2023Ravie LakshmananPrivacy / Tech Meta's WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in the kind ...
Category: Attack
Jun 29, 2023Ravie LakshmananCyber Threat / Hacking A previously undocumented Windows-based information stealer called ThirdEye has been discov...
Jun 30, 2023Ravie LakshmananVulnerability / Software Security MITRE has released its annual list of the Top 25 "most dangerous software weakne...
Jun 29, 2023Ravie LakshmananMobile Security / Privacy Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed...
Jun 29, 2023Ravie Lakshmanan The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-contro...
Jun 29, 2023Ravie LakshmananMobile Security / Malware Cybersecurity researchers have shared the inner workings of an Android malware family ca...
Jun 29, 2023Ravie LakshmananVulnerability / Malware The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented...
Cyber threat intelligence is an effective weapon in the ongoing battle to protect digital assets and infrastructure - especially when combined w...
Jun 29, 2023Ravie LakshmananWebsite Security / Vulnerability A critical security flaw has been disclosed in miniOrange's Social Login and Regi...
Jun 28, 2023Ravie LakshmananFirmware Security / Tech Drones that don't have any known security weaknesses could be the target of electromagnet...