Internet Security

Supply Chain Attack Compromises npm Packages, Deploys Monero Miner
Malware & Threats Supply Chain Attack Compromises npm Packages, Deploys Monero Miner

On December 20, 2024, a significant cybersecurity incident unfolded, targeting popular npm packages. Attackers exploited a hijacked npm token to inject malicious code into updates for @rspack/core, @rspack/cli, and the Vant package. The primary goal of this breach was to deploy the XMRig Monero

Critical Path Traversal Flaw Resolved in Adobe ColdFusion Updates
Malware & Threats Critical Path Traversal Flaw Resolved in Adobe ColdFusion Updates

The recent detection of a critical vulnerability in Adobe ColdFusion versions 2023 and 2021 has heightened concerns surrounding the security of web applications utilizing this software. Tracked as CVE-2024-53961, this flaw leverages a path traversal weakness, which permits unauthorized access to

Are iPhone Users Safe from the New 'Zero-Click' Spyware Threat?
Malware & Threats Are iPhone Users Safe from the New 'Zero-Click' Spyware Threat?

Apple recently issued a critical security warning to iPhone users about sophisticated spyware capable of compromising devices without any user interaction. This revelation has sent shockwaves through the tech community, raising concerns about the vulnerability of even the most secure smartphones.

How Do You Install and Use Vuls for Linux Vulnerability Scanning?
Malware & Threats How Do You Install and Use Vuls for Linux Vulnerability Scanning?

Vuls, a free and open-source vulnerability scanner for Linux, offers a robust solution for scanning networked machines efficiently and effectively. It's specialized for various operating systems, provides multiple scanning methods, and doesn't require the installation of agents on

Do You Need a VPN for Safe and Unrestricted Internet in Thailand?
Infrastructure & Network Security Do You Need a VPN for Safe and Unrestricted Internet in Thailand?

Thailand’s picturesque beaches may be a haven for tourists, but its internet scene is a different story with strict government surveillance, censorship, and limitations on popular streaming platforms. You might be a local deeply concerned with your privacy, an expat trying to access services from y

Novalock Ransomware: How to Remove and Recover Your Encrypted Files
Malware & Threats Novalock Ransomware: How to Remove and Recover Your Encrypted Files

The rising threat of ransomware has reached alarming levels, with Novalock ransomware being a recent example of sophisticated malware that targets and encrypts your valuable files. Belonging to the notorious Globeimposter virus family, Novalock has become a significant concern for both individual

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later