Posts From Mo Moin

New research published today by Zix-AppRiver has revealed that 61% of US executives feel powerless to stop employees holiday shopping on company devices, despite knowing that the practice poses a cybersecurity threat to the business. Researchers asked 1,049 cybersecurity decision-makers

Ethical hackers from around the world have been invited to discover and fix vulnerabilities in Japan’s largest messaging app. LINE Corporation today launched a public bug bounty program (BBP), offering hackers financial rewards for identifying glitches throughout LINE’s web domains

A new threat actor tracked as TA2101 is conducting malware campaigns using email to impersonate government agencies in the United States, Germany, and Italy. A new threat actor, tracked as TA2101, is using email to impersonate government agencies in the

New Critical vulnerability found in both Android/iOS WhatsApp version Let hackers sending a specially crafted MP4 file to WhatsApp user and trigger the stack-based buffer overflow to perform remote code execution and DoS Attack. Facebook-owned privacy-oriented messenger WhatsApp is one

A Home Office app intended for EU citizens to apply for UK residency lacks basic security, potentially exposing the passport and biometric information of over one million users, according to experts. Norwegian security firm Promon tested the EU Exit: ID

Researchers detect a wave of malware campaigns from a new hacking group named TA2101 that targeting various organizations in German and Italy to deploy the backdoor malware in their network. Threat actors from this new hacking group using legitimate and

Travelers in Los Angeles have been urged by officials not to use public USB charging points for fear they might infect their devices with malware. LA County district attorney, Jackie Lacey, posted an official fraud alert warning of USB charging

A vulnerability in Qualcomm’s Secure Execution Environment(QSEE) implementation of the Trusted Execution Environment(TEE) used in a number of devices especially in Android devices lets attackers to steal sensitive data from the isolated secure area of the processor. Qualcomm implementation used

Security researchers are warning oil and aviation industry organizations to be on their guard after spotting a notorious Iranian APT group using private VPNs to keep its activity hidden. APT33 has been linked to the infamous Shamoon destructive malware which

The Email Subscribers & Newsletters is a WordPress newsletter plugin used to send post notifications, send broadcasts. It can be integrated with Mailchimp and the plugin has more than 100,000+ active installs. Wordfence Threat Intelligence team has discovered multiple vulnerabilities

Researchers uncovered a new wave of a targeted cyberattack against the organizations in the Middle East, the U.S., and Asia using an obfuscated Malware with dozen live Command and Control (C&C) botnet servers. A Well-known threat group is known as

Symantec addressed a local privilege escalation flaw that affects all Symantec Endpoint Protection client versions prior to 14.2 RU2. Symantec addressed a local privilege escalation flaw, tracked as CVE-2019-12758, that affects all Symantec Endpoint Protection client versions prior to 14.2

Cyber professionals will compete to find leads in real missing persons cases in a competition in Washington, DC, next month. SANS Institute has teamed up with non-profit organization Trace Labs to host the Open-Source Intelligence (OSINT) Missing Persons Capture the

New research into domains registered with a trusted TLS certificate has found lookalike domains outnumber legitimate retails sites by more than 4:1. In a study conducted by researchers at Venafi, suspicious domains targeting 20 major retailers in the US, UK,

Users of the Facebook app have complained after discovering a bug that causes their iPhone cameras to activate in the background when they use the app. Multiple people have taken to Twitter to report that using the Facebook app on

Researchers discovered a new PureLocker Ransomware that capable of encrypting files in Windows, Linux, and macOS. The ransomware used by threat actors to perform a targeted attack against production servers of the enterprise networks. Code reuse analysis against Purelocker reveals