Technology

The maintainers of Exim have released patches to remediate as many as 21 security vulnerabilities in its software that could enable unauthenticated attackers to achieve complete remote code execution and gain root privileges. Collectively named ’21Nails,’ the flaws include 11 vulnerabilities that require local access to the server and 10 other weaknesses that could be
0 Comments
Researchers on Tuesday disclosed a novel malware that uses a variety of tricks to stay under the radar and evade detection, while stealthily capable of executing arbitrary commands on infected systems. Called ‘Pingback,’ the Windows malware leverages Internet Control Message Protocol (ICMP) tunneling for covert bot communications, allowing the adversary to utilize ICMP packets to
0 Comments
Iran has been linked to yet another state-sponsored ransomware operation through a contracting company based in the country, according to new analysis. “Iran’s Islamic Revolutionary Guard Corps (IRGC) was operating a state-sponsored ransomware campaign through an Iranian contracting company called ‘Emen Net Pasargard’ (ENP),” cybersecurity firm Flashpoint said in its findings summarizing three documents leaked
0 Comments
Google is adding an “External” label to identify email threads/ conversations that include recipients from outside of a user’s Google Workspace organisation. This is being done to identify emails that are sent to or by people who are not part of your organisation. The new badge comes in addition to the existing warning banner that
0 Comments
Click Studios, the Australian software firm which confirmed a supply chain attack affecting its Passwordstate password management application, has warned customers of an ongoing phishing attack by an unknown threat actor. “We have been advised a bad actor has commenced a phishing attack with a small number of customers having received emails requesting urgent action,”
0 Comments
Microsoft researchers on Thursday disclosed two dozen vulnerabilities affecting a wide range of Internet of Things (IoT) and Operational Technology (OT) devices used in industrial, medical, and enterprise networks that could be abused by adversaries to execute arbitrary code and even cause critical systems to crash. “These remote code execution (RCE) vulnerabilities cover more than
0 Comments