vulnerability

Serious vulnerability in Apache Logging System

Cybersecurity Researchers from CrowdStrike have found a new zero-day flaw that, as per their analysis, can prove as a worst internet hack ever detected in the history. Dubbed as Log4Shell, the new flaw allows threat actors to log into a system with no authentication, such as passwords. Currently, the susceptibility was witnessed on Microsoft owned […]

Mediatek vulnerability in Android phones fixed

A serious vulnerability in MediaTek processors that could have allowed hackers to spy onto a targeted device has been fixed now. The technical flaw was detected in AI Processing Unit(APU) and Digital Signal Processor (DSP) and was having the potential of allowing a threat actor to eavesdrop on a user device and send media files […]

Two serious vulnerabilities detected on Windows 10 and Windows 11 Operating Systems

Microsoft has issued a warning to its Windows 10 and Windows 11 users against two serious zero day vulnerabilities that have to be fixed yet. It is regarding an OS feature called Microsoft Installer aka MSI that is exhibiting repairing or updating issues with anti-malware apps after the installation of KB5007215 update. Currently, the Satya […]

Blackswan vulnerability puts billions of Windows Systems to risk

A discovery of seven zero day vulnerabilities in Microsoft Windows Operating System has reportedly put billions of PC users to risk. And reports are in that the bug/s have existed in the wild since 2007, the time when the Satya Nadella led company released the Vista version of its Windows OS. Field Effect is the […]

Apple Inc issues fix to Pegasus Spyware vulnerability in iPhones

Apple Inc has proudly announced that it has issued a fix to the famous Pegasus Spyware vulnerability existing on iPhones that could lead remote hackers to take control of the device to conduct espionage. Factually, the newly detected flaw was an addition to the already detected Pegasus malware flaw that was developed by NSO Group […]

Details about Microsoft Azure Cosmos DB vulnerability

Customers using Microsoft Azure cloud platform for their application needs are being warned against a new vulnerability that has been discovered recently by a security company named WIZ. The Cybersecurity firm has named the Cosmos DB vulnerability as ChaosDB vulnerability and warned that the flaw could have exposed content related to thousands of Azure clients […]

Kalay platform vulnerability exposes millions of IoT devices to cyber attacks

Cybersecurity Researchers from Mandiant have disclosed that millions of IoT devices operating across the globe were vulnerable to cyber attacks because of a flaw in Kalay Cloud platform software supplied by ThroughTek. On Tuesday this week, the bug dubbed as CVE-2021-28372 was reported to US Cybersecurity and Infrastructure Security Agency (CISA) by the researchers of […]

Telegram offers fix to its non encrypted chat vulnerability

Telegram made it official that it has offered a security fix to non-encrypted chats that were previously vulnerable to cyber attacks through manipulated bots. The chat services provider announced that the fix will be rolled in an automated manner and expects to put an end to all media speculations that its ‘Secret Chat’ feature that […]

Critical Microsoft Windows Vulnerability found

Microsoft Corporation is urging all Windows users including those using Win 7 and 8 operating systems to update their devices with the latest security patches. Or else they are on the verge of getting hacked by cyber crooks that could then install programs, view or delete data or even create new user accounts of a […]

Vulnerability makes hackers hijack video streams from millions of connected cameras

A recent study made by Nozomi Networks, a security company that offers solutions for IoT products has discovered that millions of connected cameras are on the verge of being hijacked by cyber crooks through a vulnerability. Security researchers say that the flaw is related to software component used in cloud surveillance platform ThroughTek that is […]

Share this page