Application Security

Malware Campaign Exploits DLL Side-Loading in c-ares Library
Application Security
Malware Campaign Exploits DLL Side-Loading in c-ares Library
Security experts uncovered a malware scheme bypassing security via DLL side-loading in c-ares library. Attackers leverage a malicious libcares-2.dll to deploy trojans.
Fortinet's Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Application Security
Fortinet’s Latest Patches Target Critical Vulnerabilities in FortiFone and FortiSIEM
Fortinet's recent patch release addresses six security vulnerabilities, with two significant vulnerabilities found in FortiFone and FortiSIEM. These critical issues could be exploited without authentication, ...
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Application Security
Chrome Extension Impersonates Trading Tool to Steal MEXC API Keys
Cybersecurity experts have identified a harmful Google Chrome extension that pretends to be a trading facilitator on the MEXC cryptocurrency exchange. Named MEXC API Automator, ...
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Application Security
Android Users Encounter Issue with Volume Buttons When Accessibility Features are Enabled
Users of Android devices face difficulties with the volume buttons not functioning properly due to a software bug affecting those with accessibility features enabled.
Adobe's Latest Security Patches Address Critical Vulnerabilities in ColdFusion
Application Security
Adobe’s Latest Security Patches Address Critical Vulnerabilities in ColdFusion
Adobe recently released updates to resolve 25 vulnerabilities across its software products. A critical bug in ColdFusion, linked to Apache Tika, is among the flaws ...
Microsoft Enhances Secure Boot Certificates for Windows 11
Application Security
Microsoft Enhances Secure Boot Certificates for Windows 11
Microsoft introduces updated Secure Boot certificates for eligible Windows 11 systems, aiming to bolster security through automated installations, adding precautionary measures against past vulnerabilities.
Implementing Access Reviews to Enhance Security in Microsoft 365
Application Security
Implementing Access Reviews to Enhance Security in Microsoft 365
Microsoft 365 simplifies file sharing, potentially exposing organizations to data breaches. Access reviews can mitigate these risks by controlling permissions.
Telegram's Proxy Link Vulnerability Exposes IP Addresses
Application Security
Telegram’s Proxy Link Vulnerability Exposes IP Addresses
Users' IP addresses are at risk when interacting with seemingly harmless Telegram proxy links. Learn about how Telegram is enhancing its security to mitigate these ...
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
Application Security
CISA Directs Agencies to Secure Systems After Exploitation of Zero-Day Gogs Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) mandates government agencies to immediately secure systems against a high-severity Gogs vulnerability, CVE-2025-8110, exploited in the wild. Organizations ...
Meta Addresses Security Vulnerability in Instagram Password Resets
Application Security
Meta Addresses Security Vulnerability in Instagram Password Resets
Meta recently resolved a flaw in Instagram’s password reset process that allowed unauthorized entities to trigger reset emails, raising security concerns. Despite addressing this issue, ...