Hackers’ Toolkit Exposed, Wide Range of Tools from Initial Access to Full Control
12
Aug
2024

Hackers’ Toolkit Exposed, Wide Range of Tools From Initial Access to Full Control

Cybersecurity researchers have discovered an extensive hacker toolkit, revealing a comprehensive set of tools designed for various stages of cyberattacks….

0.0.0.0 Day – 18 Yr Old Vulnerability Let Attackers Bypass All Browser Security
12
Aug
2024

Google’s Quick Share Vulnerabilities Let Attackers Execute Remote Code

By reverse-engineering Quick Share’s proprietary communication protocol, researchers uncovered multiple vulnerabilities, including unauthorized file writes, forced Wi-Fi connections, directory traversal,…

Resecurity unveils new AI-driven Fraud Prevention Platform
12
Aug
2024

Resecurity unveils new AI-driven Fraud Prevention Platform

Resecurity unveiled its advanced AI-driven Fraud Prevention Platform. This versatile solution is engineered to combat fraud across banking, virtual asset…

Amazon Customer Data Breach
12
Aug
2024

Amazon Customer In India Alleges Data Breach After Fake Orders

An Amazon customer in India has raised concerns about a potential data breach at Amazon after receiving duplicate orders and…

EastWind campaign targets Russian organizations with sophisticated backdoors
12
Aug
2024

EastWind campaign targets Russian organizations with sophisticated backdoors

EastWind campaign targets Russian organizations with sophisticated backdoors Pierluigi Paganini August 12, 2024 A campaign tracked as EastWind is targeting…

Vulnerabilities in AWS
12
Aug
2024

Vulnerabilities in AWS Lets Attackers To Gain Full-Service Takeover

Researchers from Aqua identified critical vulnerabilities in six Amazon Web Services (AWS): CloudFormation, Glue, EMR, SageMaker, ServiceCatalog, and CodeStar. These…

week in security
12
Aug
2024

A week in security (August 5 – August 11)

Last week on Malwarebytes Labs: Last week on ThreatDown: Stay safe! Our business solutions remove all remnants of ransomware and…

Industrial Remote Access Tool
12
Aug
2024

Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

Aug 12, 2024Ravie LakshmananOperational Technology / Network Security Security vulnerabilities have been disclosed in the industrial remote access solution Ewon…

Vulnerabilities in Qualcomm’s Adreno GPU Chipsets Affect Billions of Android Devices
12
Aug
2024

Qualcomm’s Adreno GPU Vulnerabilities Affect Billions of Android Devices

Google researchers have identified critical security vulnerabilities within Qualcomm’s Adreno GPU, potentially affecting billions of Android devices globally. If exploited,…

Forrester: Rethink your software asset management practices
12
Aug
2024

Forrester: Rethink your software asset management practices

Software asset management (SAM) has evolved from simple back-office record-keeping to more complex licence and contract management that integrates innovative…

AMD Confronts Sinkclose Vulnerability, Releases Limited Updates
12
Aug
2024

AMD Confronts Sinkclose Vulnerability, Releases Limited Updates

AMD is currently confronting a major security challenge involving the Sinkclose vulnerability, a critical flaw affecting a wide range of…

Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE
12
Aug
2024

Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE

Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE Pierluigi Paganini August 12, 2024 Microsoft found…