Researchers had found out that several Motorola handset models especially there G4 7 g5 are vulnerable to a critical kernel command line injection flaw that could allow a local malicious application to execute arbitrary code on the devices. Their CVE Report :
GOOGLE PLAYSTORE Found its First Rooting-Trojan with code injection capability
A new Android-rooting malware with an ability to disable device’ security settings in an effort to perform malicious tasks in the background has been detected on the official Play Store. What’s interesting? The app was smart enough to fool Google
MS PowerPoint Hack Spreads MALWARE
A new variant of a malware called “Zusy” has been found in the wild spreading as a PowerPoint file attached to spam emails with titles like “Purchase Order #130527” and “Confirmation”. It’s interesting because it doesn’t require the user to
40000 Subdomains Shut Down
Tens of thousands of illegally established subdomains used by criminals involved with the RIG Exploit Kit were recently taken down after an investigation revealed that hackers were phishing domain account credentials to set up these subdomains. Most of the subdomains
EternalBlue Exploit spreading GHOST RAT & Nitol
EternalBlue, the exploit used in the WannaCry ransomware outbreak, is now being leveraged to distribute the Nitol backdoor and Gh0st RAT malware. Security researchers at FireEye said, just as WannaCry criminals did, threat actors are leveraging the same Microsoft Server Message
CIA tools hack windows silently over the network
WikiLeaks had published details of a purported CIA operation that turns Windows file servers into covert attack machines that surreptitiously infect computers of interest inside a targeted network. “Pandemic,” as the implant is codenamed, turns file servers into a secret
Vulnerability in Sudo Command — affects all Linux distros
A high-severity vulnerability has been reported in Linux that could be exploited by a low privilege attacker to gain full root access on an affected system.This vulnerability affecting the manner in which Sudo parsed tty information could have resulted in
The Judy Android Malware: Possibly the largest malware campaign found on Google Play
After WannaCry’s sizable impact on many Windows machines around the world, details have been revealed of a malware campaign targeting Android devices through the Google Play Store. The auto-clicking adware, named ‘Judy’, was discovered by the IT security firm, Check
All Android Phones can be take over by attacker’s — Cloak & Dagger Attack
Security researchers have discovered a new attack, named as ‘Cloak and Dagger‘, that will works against all versions of Android, up to version 7.1.2. Cloak and Dagger attack allows hackers to silently take full control of your device and steal
Ransomware Attack – Security Update
Please find some details around Ransomware Attack and preventions methods. Details: Users of Windows need to be notified ASAP of a new ransomware strain Specifically, on May 12, 2017 a new strain of the Ransom.CryptXXX (WannaCry) strain of ransomware began