As Zoom Booms, Incidents of ‘ZoomBombing’ Become a Growing Nuisance
Numerous instances of online conferences being disrupted by pornographic images, hate speech or even threats can be mitigated using some platform tools.
Numerous instances of online conferences being disrupted by pornographic images, hate speech or even threats can be mitigated using some platform tools.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Cybersecurity researchers with Qihoo 360’s NetLab today unveiled details of two recently spotted zero-day cyberattack campaigns in the wild targeting enterprise-grade networking devices manufactured by Taiwan-based DrayTek. According to the report, at least two separate groups of hackers exploited two critical remote command injection vulnerabilities (CVE-2020-8515) affecting DrayTek Vigor enterprise switches, load-balancers, routers and VPN…
The vulnerability can be exploited to reveal limited traffic data including a device’s IP address.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A newly discovered watering-hole campaign is targeting Apple iPhone users in Hong Kong by using malicious website links as a lure to install spyware on the devices. According to research published by Trend Micro and Kaspersky, the “Operation Poisoned News” attack leverages a remote iOS exploit chain to deploy a feature-rich implant called ‘LightSpy’ through…
The malware, the work of a new APT called TwoSail Junk, allows deep surveillance and total control over iOS devices.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
CVE-2020-10245, a heap-based buffer overflow that rates 10 out of 10 in severity, exists in the CODESYS web server and takes little skill to exploit.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The food container company’s main website had a card skimmer that scooped up online customers’ payment card data.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Preying on public fears, the ongoing coronavirus outbreak is proving to be a goldmine of opportunity for attackers to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps. Now in a fresh twist, third-party Android app developers too have begun to take advantage of the situation to use…
Apple’s security update included a slew of vulnerabilities in various components of iOS, macOS and Safari – the most severe of which could enable remote code execution.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The malware authors behind TrickBot banking Trojan have developed a new Android app that can intercept one-time authorization codes sent to Internet banking customers via SMS or relatively more secure push notifications, and complete fraudulent transactions. The Android app, called “TrickMo” by IBM X-Force researchers, is under active development and has exclusively targeted German users…