Application Security

Booking.com Confirms Unauthorized Access Compromising User Data
Application Security
Booking.com Confirms Unauthorized Access Compromising User Data
Unauthorized access at Booking.com exposes user and reservation data, raising cybersecurity concerns.
LinkedIn's Browser Extension Draws Corporate Espionage Allegations
Application Security
LinkedIn’s Browser Extension Draws Corporate Espionage Allegations
Examination of allegations linking LinkedIn's browser extension to corporate espionage conducted by Microsoft.
OpenAI Responds to Supply Chain Attack Affecting macOS Security
Application Security
OpenAI Responds to Supply Chain Attack Affecting macOS Security
OpenAI confronts potential compromise of macOS code signing certificate due to North Korean-linked Axios supply chain attack.
GlassWorm Campaign Deploys New Zig Dropper to Target Developer IDEs
Application Security
GlassWorm Campaign Deploys New Zig Dropper to Target Developer IDEs
New Zig dropper in GlassWorm campaign targets IDEs, posing threats to developers.
AI Browser Extensions Pose a Hidden Risk to Network Security
Application Security
AI Browser Extensions Pose a Hidden Risk to Network Security
Exploring the overlooked risks AI browser extensions pose to network security.
Critical Marimo Vulnerability Is Now Being Actively Exploited for Credential Theft
Application Security
Critical Marimo Vulnerability Is Now Being Actively Exploited for Credential Theft
Marimo faces a severe RCE vulnerability allowing credential theft. Immediate action is crucial.
Emerging Threats in Malware Recent Developments in Software Vulnerabilities
Application Security
Emerging Threats in Malware: Recent Developments in Software Vulnerabilities
New malicious npm packages, deceptive LNK files, and compromised servers illustrate evolving malware tactics.
CPUID Website Was Briefly Compromised to Spread Remote Access Trojan
Application Security
CPUID Website Was Briefly Compromised to Spread Remote Access Trojan
Threat actors compromised the CPUID site for less than 24 hours, deploying a remote access trojan.
U.S. Agencies Given Four Days to Patch Critical Ivanti EPMM Vulnerability
Application Security
U.S. Agencies Given Four Days to Patch Critical Ivanti EPMM Vulnerability
CISA mandates U.S. agencies to patch critical Ivanti EPMM vulnerability within four days as active exploitation continues.
EngageLab SDK Vulnerability Threatens Millions of Android Cryptocurrency Wallets
Application Security
EngageLab SDK Vulnerability Threatens Millions of Android Cryptocurrency Wallets
Vulnerability in EngageLab SDK put Android cryptocurrency wallets at risk, bypassing security sandbox protections.