Cybersecurity Blog
91,000 Smart LG TV Devices Vulnerable to Remote Takeover
Cybersecurity researchers from Bitdefender discovered critical vulnerabilities in LG TVs running webOS versions 4 ...
Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel
Apr 10, 2024NewsroomHardware Security / Linux Cybersecurity researchers have disclosed what they say is the ...
Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses
Apr 10, 2024The Hacker NewsWebinar / Identity Security We all know passwords and firewalls are important, but what ...
Novel Ahoi attacks could compromise confidential VMs
Confidential virtual machines could be breached through two different types of novel Ahoi attacks, reports SecurityWeek. ...
Vedalia APT Group Exploits Oversized LNK Files in Malware Campaign
The Vedalia APT group has ingeniously utilized LNK files with double extensions, effectively masking the malicious .lnk ...
Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included
Microsoft has released security updates for the month of April 2024 to remediate a record 149 flaws, two of which have ...
Critical ‘BatBadBut’ Rust Vulnerability Exposes Windows Systems to Attacks
Apr 10, 2024NewsroomSoftware Security / Vulnerability A critical security flaw in the Rust standard library could be ...
Phishing Deception – Suspended Domains Reveal Malicious Payload for Latin American Region
Recently, we observed a phishing campaign targeting the Latin American region. The phishing email contained a ZIP file ...