Every Wi-Fi devices are vulnerable to FragAttacks: Security Researcher

FragAttacks are a group of recently discovered Wi-Fi security vulnerabilities that affect all Wi-Fi devices, including computers, smartphones, and smart devices (fragmentation and aggregation attacks).   Three of these flaws…

Beware: Fake PUBG (Battlegrounds Mobile India) circulated

Cybercriminals are taking advantage of the excitement surrounding the upcoming battle royale game to flood the internet with fake PUBG download links that will almost certainly install malware on your…

Ransomware gang leaks Metropolitan Police Department’s data

Metropolitan Police Department data leak: Ransomware gang leaks data. After unsuccessful negotiations with the DC Police, the cybercriminals behind the Babuk ransomware have leaked more personal files belonging to the…

Adobe releases patches for zero-day vulnerability in Adobe Reader

Adobe’s Patch Tuesday updates for May include patches for several vulnerabilities affecting 12 different devices, including a zero-day bug in Adobe Reader that is being actively exploited in the wild.…

Android banking malware-Teabot exploited in the wild

Security researchers have discovered a new Android malware that, once installed on the victim’s device, allows the threat actors behind it to obtain a live stream of the device’s screen…

Colonial Pipeline hit by ransomware attack, shuts down operation

Colonial Pipeline, the country’s largest fuel pipeline, was forced to shut down operations after being hit by ransomware.   The Colonial Pipeline exports refined petroleum products from Gulf Coast refineries…

Microsoft Edge blocks Firefox installer: Report

Microsoft Defender SmartScreen is a feature of the company’s Edge browser that analyses unknown files downloaded from the internet before allowing them to be run on a computer.   Though…

6 Unpatched bugs discovered in Remote Mouse App

Six unpatched Remote Mouse bugs have been discovered in Remote Mouse app, that allows a remote attacker to execute complete code without requiring user interaction.   Axel Persinger, a security…

Beware: Foxit Reader bug allows hackers run malicious code via PDFs

Foxit Software has released security updates for its widely used Foxit reader to fix a high-severity remote code execution (RCE) vulnerability.   As a result of this security vulnerability, attackers…

Moriya Windows rootkit exploited in wild for highly targeted attacks

Unknown threat actors have been using a Windows rootkit to install backdoors on compromised machines for years.   According to Kaspersky’s Operation TunnelSnake campaign (active since 2018), an advanced persistent…