Category: Vulnerabilities

Top Software Testing Services

Malware For Apple M1 Chip Has Been Discovered For The First Time In The Wild

The first malware variant custom-fitted to run locally on Apple’s M1 chips has been found, hinting another advancement that demonstrates that threat actors have started adjusting with vindictive software to focus on the organization’s most recent generation of Macs fueled by its own processors. While the transition to Apple silicon has required developers to construct…
Read more

Many Video Calling Platforms Vulnerable To Snooping Due To A Bug In Agora SDK

McAfee’s Advanced Threat Research Team, published a report/research, according to which, attackers or hackers would have been able to snoop or spy on active private audio and video calls utilizing a critical vulnerability found in the popular SDK (Software Development Kit) of video calling platforms. The report explains that the vulnerability was found in SDK…
Read more

A Vulnerability In Android App ShareIt May Have Allowed Hackers To Infuse Malware

Different unpatched weaknesses have been found in SHAREit, which is a famous application with more than one billion downloads, that could be mishandled to release a client’s delicate information, execute malicious code, and conceivably result in remote code execution. The vulnerabilities were discovered through Trend Micro‘s examination of the Android variant of the application that…
Read more

Secret Chats On Telegram Could Be Exposed By Just Sending A Sticker

Details of a presently fixed vulnerability in the Telegram messaging application that might have revealed client’s secret chats, photographs, and videos to remote threat actors were revealed on Monday by cybersecurity researchers. The vulnerabilities were found by an Italy-based Shielder in iOS, Android, and macOS variants of the application. Following the capable revelation, Telegram tended…
Read more

Android Devices Now Being Targeted By LodaRAT Windows

A former Windows RAT (Remote Access Trojan) that had the abilities of credential-stealing has now been upgraded and its scope has been widened to cover and target Android device users to increase the attacker’s espionage motives. Researchers from Cisco Talos, in a blog post, said that “The developers of LodaRAT have added Android as a…
Read more

New Chrome Zero-Day Vulnerability Being Exploited In The Wild, Update Your Chrome ASAP

A zero-day vulnerability has been patched by Google, found in desktop chrome web browser, for which the organization said that it was being exploited in the wild. The organization, Google, in a blog post, said, “Google is aware of reports that an exploit for CVE-2021-21148 exists in the wild.” The vulnerability was found and informed…
Read more

iPhones Vulnerable To Zero-Click Spyware Attacks

36 Personal iPhones that belonged to Al-jazeera’s journalists were taken control of in a cyberattack that took place around July, August 2020. It is believed that the attack was done by nation-state-backed advanced persistent threats (APTs) groups probably belonging or linked to Middle-Eastern countries. The iMessage service of iPhone had a zero-day, exploited by attackers,…
Read more

Researchers Discovered Hacking Of Azure Functions And Escaping Docker

Paul Litvak, a cybersecurity researcher at Interzer Lab, recently revealed an unfixed vulnerability in Microsoft Azure Functions that could be utilized by an aggressor to elevate rights and escape from the Docker container that is utilized for facilitating them (privileges). The discovery of the vulnerability occurred during the Intezer Lab’s examinations concerning the Azure compute…
Read more

Any Unprivileged User Can Gain Root Privileges On A Linux System Using A Default Sudo Configuration

The research team of Qualys, recently found a vulnerability in sudo, dubbed as the heap overflow vulnerability. Sudo is an omnipresent and powerful open-source utility that is mainly utilized on operating systems like Unix and Linux. This vulnerability has been registered as CVE-2021-3156. Exploiting this vulnerability can allow any unauthorized user, without any permissions, to…
Read more

Exploited In The Wild, 3 iOS Zero-Day Vulnerabilities Revealed By Apple

Updates of iOS, iPadOs, and tvOS have been released by Apple, on Tuesday, which includes patches/fixes for three vulnerabilities, that Apple believes, which could have been exploited in the wild quite often. The three vulnerabilities have been registered, as CVE-2021-1782, CVE-2021-1870, and CVE-2021-1871, and were capable of serving a hacker/attacker to escalate privileges and gain…
Read more