LATEST

Critical Nginx UI Vulnerabilities Allow Attacker to Download a Full System Backup

Critical Nginx UI Vulnerabilities Allow Attacker to Download a Full System Backup

CYBER ATTACKZerowl

Vulnerabilities in the Nginx UI Full system backups can be downloaded and decrypted by unauthorized attackers thanks to a recently identified critical.

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

CYBER ATTACKZerowl

Malicious Images Cause Code Execution on macOS Due to an ExifTool Flaw The long-held notion that macOS systems are intrinsically resistant to malware is.

ClipXDaemon Emerges as C2-Less Linux Clipboard Hijacker, Targeting Crypto Wallets in X11 Sessions

ClipXDaemon Emerges as C2-Less Linux Clipboard Hijacker, Targeting Crypto Wallets in X11 Sessions

CYBER ATTACKZerowl

In X11-based desktop environments, a recently identified Linux malware called ClipXDaemon has become a direct financial threat to cryptocurrency users.

Chinese Cyber Threat Lurks In Critical Asian Sectors for Years

Chinese Cyber Threat Lurks In Critical Asian Sectors for Years

DATA BREACHZerowl

For years, a Chinese-speaking threat actor has been using a combination of custom malware, open-source tools, and living-off-the-land binaries in Windows.

Chinese-Linked CL-UNK-1068 Espionage Campaign Targets Critical Infrastructure Across Asia

Chinese-Linked CL-UNK-1068 Espionage Campaign Targets Critical Infrastructure Across Asia

CYBER ATTACKZerowl

Since at least 2020, a Chinese-affiliated cyber-espionage group known as CL-UNK-1068 has been secretly attacking vital infrastructure throughout South.

Can the Security Platform Finally Deliver for the Mid-Market?

Can the Security Platform Finally Deliver for the Mid-Market?

The goal of mid-market companies is to attain security levels comparable to those of their enterprise counterparts This article explores achieving.

Apache ZooKeeper Vulnerability Allows Attackers to Access Sensitive Data

Apache ZooKeeper Vulnerability Allows Attackers to Access Sensitive Data

CYBER ATTACKZerowl

Two high-impact vulnerabilities that could result in the exposure of sensitive data and possible server impersonation attacks have been addressed by.

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

Cybersecurity for another week. One more week of "you've got to be kidding me." The attackers were occupied. The defenders were occupied.

ZITADELs 1-Click Vulnerability Allows Attackers to Take Over Entire Systems

ZITADELs 1-Click Vulnerability Allows Attackers to Take Over Entire Systems

CYBER ATTACKZerowl

The open-source identity and access management (IAM) platform ZITADEL, which is frequently utilized by businesses for safe authentication procedures, has.

WiFi Signals Reveal Human Activities Through Walls by Mapping Body Keypoints

WiFi Signals Reveal Human Activities Through Walls by Mapping Body Keypoints

CYBER ATTACKZerowl

There are serious security and surveillance concerns because π RuView, a new open-source edge AI system, is transforming standard WiFi infrastructure into.

Top 5 this week

Page 83 of 207