CVE-2021-35392
CVE-2021-35392
The Apple AirTag has been available for just over a week. Since then, we have seen a user rebuilding an AirTag as a thinner card that fits into wallets and also learned that it’s “frighteningly easy” to stalk using the item tracker. Now, a security researcher was able to hack the accessory, modifying its NFC…
The US Department of Justice has charged a Latvian woman for allegedly being part of the infamous Trickbot Group that deployed the Trickbot malware, which infected millions of victim computers worldwide. The Trickbot Group operated in Russia, Belarus, Ukraine, and Suriname, and primarily targeted victim computers belonging to businesses, entities, and individuals. Targets…
Microsoft warned about a massive credential phishing campaign using open redirects. Here’s how you can recognize these phishing mails. The Microsoft 365 Defender Threat Intelligence Team posted an article stating that they have been tracking a widespread credential phishing campaign using open redirector links. Open redirects have been part of the phisher’s arsenal for a…
Owners of Gigaset Android phones have been repeatedly infected with malware since the end of March after threat actors compromised the vendor’s update server in a supply-chain attack. Gigaset is a German manufacturer of telecommunications devices, including a series of smartphones running the Android operating system. Starting around March 27th, users suddenly found their Gigaset…
Adversaries are deploying DearCry ransomware on victim systems after hacking into on-premise Microsoft Exchange servers that remain unpatched, Microsoft acknowledged late Thursday. “Microsoft observed a new family of human operated ransomware attack customers,” Microsoft Security Program Manager Phillip Misner tweeted at 9:19 p.m. ET Thursday. “Human operated ransomware attacks are utilizing the Microsoft Exchange vulnerabilities…
Cybersecurity researchers have disclosed a critical unpatched vulnerability affecting Pling-based free and open-source software (FOSS) marketplaces for Linux platform that could be potentially abused to stage supply-chain attacks and achieve remote code execution (RCE). “Linux marketplaces that are based on the Pling platform are vulnerable to a wormable [cross-site scripting] with potential for a supply-chain…