Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

iPhones running latest iOS hacked to deploy NSO Group spyware
iPhones running latest iOS hacked to deploy NSO Group spyware
iPhones running latest iOS hacked to deploy NSO Group spyware
iPhones running latest iOS hacked to deploy NSO Group spyware

iPhones running latest iOS hacked to deploy NSO Group spyware

iPhones running latest iOS hacked to deploy NSO Group spyware Human rights non-governmental organization Amnesty International and non-profit project Forbidden Stories revealed in a recent report that they found spyware made by Israeli surveillance firm NSO Group deployed on iPhones running Apple’s latest iOS release, hacked using zero-day zero-click iMessage exploits. “Amnesty International has observed

New Windows print spooler zero day exploitable via remote print servers

New Windows print spooler zero day exploitable via remote print servers Another zero day vulnerability in Windows Print Spooler can give a threat actor administrative privileges on a Windows machine through a remote server under the attacker’s control and the ‘Queue-Specific Files’ feature. Last month, a security researcher accidentally revealed a zero-day Windows print spooler

Ransomware hits law firm counseling Fortune 500, Global 500 companies

Ransomware hits law firm counseling Fortune 500, Global 500 companies Campbell Conroy & O’Neil, P.C. (Campbell), a US law firm counseling dozens of Fortune 500 and Global 500 companies, has disclosed a data breach following a February 2021 ransomware attack. Campbell’s client list includes high-profile companies from various industry sectors, including automotive, aviation, energy, insurance, pharmaceutical, retail,

HelloKitty Ransomware is Targeting Vulnerable SonicWall Devices

HelloKitty Ransomware is Targeting Vulnerable SonicWall Devices CISA warns of threat actors targeting “a known, previously patched, vulnerability” found in SonicWall Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products with end-of-life firmware. As the US federal agency also adds, the attackers can exploit this security vulnerability as part of a targeted ransomware

× Chat with us