Endpoint Security

Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Cybersecurity
Coruna iOS Exploits Target Apple Devices in Espionage and Financial Attacks
Newly discovered Coruna iOS exploits target Apple devices in espionage and financial attacks.
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Cybersecurity
Attackers Exploit Command Injection Vulnerability in Sangoma FreePBX
Hundreds of Sangoma FreePBX systems compromised with web shells due to command injection flaw.
Warlock Ransomware Gang Breach at SmarterTools Email System Compromised
Cybersecurity
Warlock Ransomware Gang Breach at SmarterTools: Email System Compromised
The Warlock ransomware gang has infiltrated SmarterTools’ network by breaching the company's email system but has not disrupted critical business functions or accessed account data. ...
React Native's Metro Server Vulnerability A Growing Cyber Threat
Cybersecurity
React Native’s Metro Server Vulnerability: A Growing Cyber Threat
A critical flaw in React Native's Metro server is being exploited to propagate malware across Windows and Linux systems. The attacks, despite escalating in severity, ...
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
Cybersecurity
Reconnaissance Attack On Citrix NetScaler Targets Login Panels with Proxy Networks
A coordinated reconnaissance campaign used thousands of proxies to target Citrix NetScaler, aiming to pinpoint login panels. This marks a substantial cyber concern due to ...
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Cybersecurity
Cybercriminals Exploit Weak Security in 1,400 MongoDB Servers
Over 1,400 MongoDB servers, lacking secure access controls, have been seized by hackers who wiped data and left ransom notes. Cybercriminals demanded $500 in Bitcoin ...
Android Malware Incident Hugging Face Repository Misuse
Cybersecurity
Android Malware Incident: Hugging Face Repository Misuse
Malicious actors have manipulated the Hugging Face repository to distribute a Remote Access Trojan targeting Android users. The attack involved embedding harmful code into applications ...
Legal Dispute Arises Between eScan and Morphisec Over Update Server Breach
Cybersecurity
Legal Dispute Arises Between eScan and Morphisec Over Update Server Breach
eScan and Morphisec are embroiled in a dispute following an update server incident affecting eScan customers. The contention centers on claims regarding the identification of ...
Cloudflare Addresses ACME Validation Flaw Exposing Origin Servers
Cybersecurity
Cloudflare Addresses ACME Validation Flaw Exposing Origin Servers
Cloudflare patched a vulnerability in its ACME validation mechanism. The issue involved handling requests to the "/.well-known/acme-challenge/" directory, posing security risks.
New Vulnerability Affects Google’s Fast Pair Bluetooth Protocol
Cybersecurity
New Vulnerability Affects Google’s Fast Pair Bluetooth Protocol
Google's Fast Pair protocol is facing scrutiny due to a significant vulnerability that permits unauthorized Bluetooth device hijacking, tracking, and eavesdropping.