Two file management apps on the Google Play Store have been discovered to be spyware, putting the privacy and security of up to 1.5 million Android users at risk. These apps engage in deceptive behavior and secretly send sensitive user data to malicious servers in China. Pradeo, a leading mobile …
Read More »Google Patches 46 Android Vulnerabilities, Including 3 Actively Exploited
Google has released its monthly security updates for the Android operating system, addressing 46 new software vulnerabilities. Three of these vulnerabilities have been identified as actively exploited in targeted attacks. One vulnerability, tracked as CVE-2023-26083, is a memory leak flaw affecting the Arm Mali GPU driver for Bifrost, Avalon, and …
Read More »Cisco Switch Bug Could Put Encrypted Traffic at Risk
A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic. This vulnerability is due to an issue with the implementation of the ciphers that are used by …
Read More »Microsoft Teams exploiting tool on GitHub, What Microsoft say?
A new tool is available on GitHub that gives attackers a way to leverage a recently disclosed vulnerability in Microsoft Teams and automatically deliver malicious files to targeted Teams users in an organization. The tool, dubbed “TeamsPhisher,” works in environments where an organization allows communications between its internal Teams users …
Read More »Policy changed, Google now use your data for AI training
Google has made changes to its privacy policy, allowing the use of public data to enhance its artificial intelligence products, including Bard. As of July 1st, the updated policy states that Google utilizes information to improve services, develop new products, and advance technologies that benefit users and the general public. …
Read More »Decrypter released for Akira ransomware
Akira ransomware first appeared in 2017. It targeted video folders and encrypted the files without leaving any ransom notes. The encrypted files had the extension “.akira”. Researchers have been working on decrypting the files affected by Akira ransomware, and they have finally made a breakthrough. Researchers at Avast have found …
Read More »Hackers disrupt Russian satellite communications provider
A group of hackers claiming affiliation with the Wagner Group has taken down Dozor-Teleport, a Russian satellite communications provider used by energy companies and the country’s defense and security services. The attack, which began on Wednesday at 10 p.m. EST, has resulted in the disconnection of Dozor-Teleport from the internet …
Read More »Akira ransomware targets VMware ESXi servers
The Akira ransomware operation uses a Linux encryptor to encrypt VMware ESXi virtual machines in double-extortion attacks against companies worldwide. Akira first emerged in March 2023, targeting Windows systems in various industries, including education, finance, real estate, manufacturing, and consulting. Like other enterprise-targeting ransomware gangs, the threat actors steal data from …
Read More »MITRE releases new list of top 25 most dangerous software bugs
MITRE, a non-profit organization that provides research and development in the areas of cybersecurity and information assurance, has released its list of the top 25 most dangerous software weaknesses. The list is based on data from the Common Vulnerabilities and Exposures (CVE) database, which is a repository of known security …
Read More »Saudi Arabia’s Cyber Capabilities Ranked Second Globally
The Kingdom of Saudi Arabia has been ranked second in the Global Cybersecurity Index in the World Competitiveness Yearbook for 2023. The index is compiled by the International Institute for Management Development (IMD) and assesses the cybersecurity capabilities of 63 economies around the world. Saudi Arabia’s strong performance in the …
Read More »