An exploitable security flaw in Koo, India’s native twitter-clone, could have been used to execute arbitrary JavaScript code against hundreds of thousands of its users, resulting in a platform-wide attack. As a result of a stored cross-sit... Read more
Security is often jeopardized by passwords, which is why solutions like Microsoft Hello, which uses a password-free approach to log in, are becoming more common. While Windows Hello’s promise is to provide a more secure experience than con... Read more
As part of its malicious ransomware campaign, the RansomEXX gang has targeted Taiwanese motherboard maker Gigabyte. However, Gigabyte also produces other computer components and hardware, such as laptops and displays. A cyberattack on the corpor... Read more
Threat actors have made Telegram channels their favorite hangout. Recently a Remote Access Trojan (RAT) has just appeared on the scene, spreading via Telegram. What Transpired? The trojan, called FatalRAT, is being propagated via Teleg... Read more
Node.js has published fixes for a high severity vulnerability that might be exploited by attackers to corrupt the process and cause unexpected behavior, such as application crashes and possibly remote code execution (RCE). CVE-2021-22930 is a us... Read more