Top

Category: Threats & Malware

Threats and Malware


Application security, Security, Threats & Malware, Vulnerabilities

Mandatory Chinese Olympics App Has ‘Devastating’ Encryption Flaw: Analyst

January 19, 2022

Via: Security Week

The “simple but devastating flaw” in the encryption of the MY2022 app, which is used to monitor Covid and is mandatory for athletes, journalists and other attendees of the games in China’s capital, could allow health information, voice messages and […]


Threats & Malware, Vulnerabilities

Organizations Face a ‘Losing Battle’ Against Vulnerabilities

January 18, 2022

Via: Threat Post

After a banner year for vulnerabilities and cyberattacks in 2021, organizations believe they are fighting a “losing battle” against security vulnerabilities and threats, “despite the billions of dollars spent collectively on cybersecurity technology,” according to an annual security report from […]


Data loss, Threats & Malware

Serious Security: Apple Safari leaks private data via database API – what you need to know

January 18, 2022

Via: Naked Security

Researchers at browser identification company FingerprintJS recently found and disclosed a fascinating data leakage bug in Apple’s web browser software. Technically, the bug exists in Apple’s open source WebKit browser engine, which means it affects any browser that relies on […]


Hacker, Threats & Malware

U.K. Hacker Jailed for Spying on Children and Downloading Indecent Images

January 14, 2022

Via: The Hacker News

A man from the U.K. city of Nottingham has been sentenced to more than two years in prison for illegally breaking into the phones and computers of a number of victims, including women and children, to spy on them and […]


Threats & Malware, Virus & Malware

Recent GootLoader Campaign Targets Law, Accounting Firms

January 14, 2022

Via: Security Week

Initially detailed in December 2020, GootLoader is a piece of initial access malware, allowing its operators to deploy various other malware families – including ransomware – on the compromised machines. Over the past few weeks, the GootLoader hacking group has […]


Threats & Malware, Vulnerabilities

Mozilla addresses High-Risk Firefox, Thunderbird vulnerabilities

January 13, 2022

Via: Security Affairs

Mozilla released Firefox 96 that addressed 18 security vulnerabilities in its web browser and the Thunderbird mail program. Nine vulnerabilities addressed by the new release are rated high-severity, the most severe one is a race condition issue tracked as CVE-2022-22746. […]


Threats & Malware, Vulnerabilities

Microsoft has uncovered loads of Windows 11 security threats – here’s what you need to do

January 13, 2022

Via: TechRadar

Microsoft has revealed that it has discovered several serious security vulnerabilities in Windows 11, as well as other versions including Windows 10. The revelations came as part of January 2022’s ‘Patch Tuesday’ – the day of the month that Microsoft […]


Threats & Malware, Vulnerabilities

When it comes to banking security, there’s no silver bullet

January 13, 2022

Via: Help Net Security

As banks start to increasingly embrace digital transformation, they become more susceptible to cyberattacks. What is making them so vulnerable? The banking and finance industry has traditionally been slow to adopt new technologies because of complex concerns with security, privacy, […]


Threats & Malware, Virus & Malware

New SysJoker Espionage Malware Targeting Windows, macOS, and Linux Users

January 12, 2022

Via: The Hacker News

A new cross-platform backdoor called “SysJoker” has been observed targeting machines running Windows, Linux, and macOS operating systems as part of an ongoing espionage campaign that’s believed to have been initiated during the second half of 2021. “SysJoker masquerades as […]


Threats & Malware, Vulnerabilities

CISA Adds 15 Recent and Older Vulnerabilities to ‘Must-Patch’ List

January 12, 2022

Via: Security Week

Initially announced in early November 2021, the list includes more than 300 vulnerabilities that are a frequent attack vector in malicious attacks, and which represent a significant risk to federal organizations. The Known Exploited Vulnerabilities Catalog was published along with […]