Category: CyberSecurityNews
Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing…
Google introduced eight new top-level domains at the beginning of May, such as .dad, .phd, .prof, .esq, .foo, .zip, .mov,…
QNAP operating systems are robust, user-friendly software platforms that power NAS and NVR devices. QNAP offers four operating systems, and…
IPv4 addresses have been on the verge of extinction ever since the last decade. The boom of IoT (Internet of…
Spywares are software that is used as a surveillance application to collect sensitive information from victims and send it to…
Trust Wallet made a significant announcement on November 14th, 2022, unveiling its newly launched browser extension for wide usage. The…
An Open-redirect vulnerability was discovered by IBM, which could allow threat actors to spoof the original URL of IBM Security…
This week’s Threat and Vulnerability Roundup is here! We at Cyber Writes take pride in delivering a weekly roundup of…
Using a vulnerability in MOVEit Transfer, hackers gained access to 8 to 11 million individuals’ ‘Users Data’ protected health information….
Recent reports indicate that Metabase has been discovered with an unauthenticated Remote Code Execution (RCE) vulnerability that lets threat actors…
Google has announced an alerting and manual scanning mechanism which can be used to find unknown tracker alerts. This feature…
AMD Zenbleed 2 processors were found vulnerable to use-after-free flaws, enabling data theft. While the exploitation of this flaw demands…