At the end of 2019, Promon’s information security experts reported about StrandHogg vulnerability in Android, which allows malicious applications to modify legitimate ones and perform malicious operations on their behalf. Now...
Author - Emma Davis
70% of vulnerabilities in Chrome are related to memory security
Google experts estimated that approximately 70% of the security vulnerabilities in the Chrome codebase are related to memory management. Now the company is trying to figure out best solution to this problem. total, Google...
Unc0ver team published a jailbreak for iOS 13.5
Last weekend, a team of information security experts and reverse engineers from Unc0ver published a new version of the jailbreak (5.0.0) for the latest versions of iOS. This tool works for almost any iPhone, even with the latest...
Hackers use PipeMon backdoor to attack game developers
ESET experts report that the Winnti hacker group (aka Suckfly, APT41, Wicked Panda, Barium, etc.), known for its attacks on game developers, has adopted a new malware. Hackers now use the PipeMon backdoor to attack game...
Flush DNS Cache In Windows, macOS, Ubuntu
Flush DNS to resolve Internet connection-related troubles Flush DNSCache operation is a thing that stands for getting your DNS cache clear. While browsing the Internet on any operating system, your PC saves the DNS-addresses...
CyberWare group hackers attack scammers using ransomware
Bleeping Computer reports about an unusual hacker campaign launched this month – a certain group of hackers under the name CyberWare attacks various financial fraudsters. week, an information security specialist, known by...
ProLock ransomware teamed up with QakBot Trojan
This month, security experts and law enforcement turned their attention to the ProLock cryptographer, who recently attacked one of the largest ATM manufacturers, Diebold Nixdorf. According to studies, it looks like the ProLock...
New Bluetooth attack BIAS endangers devices with firmware from Apple, Broadcom, Cypress, Intel and Samsung
A team of information security experts spoke about a new attack on the Bluetooth protocol, called BIAS (Bluetooth Impersonation AttackS). bug received the identifier CVE-2020-10135 and poses a threat to the classic version of...
Improved version of Agent Tesla spread through spam in April
Check Point analysts have prepared a Global Threat Index report for April this year. They note that several coronavirus-related spam campaigns (COVID-19) are distributing a new, improved version of the Agent Tesla Trojan. In...
Zerodium will not buy exploits for iOS, as there is too many of them
On Twitter, a well-known vulnerability broker, Zerodium, reported that in the next months the company would not buy new exploits for vulnerabilities in iOS. Zerodium believes that there is too many exploits and supply has greatly...
