TheTruthSpy stalkerware, still insecure, still leaking data
Stalkerware app TheTruthSpy has been hacked for the fourth time, once again leaking the sensitive data it captures.
Stalkerware app TheTruthSpy has been hacked for the fourth time, once again leaking the sensitive data it captures.
Threat actors are abusing commercial remote software like AnyDesk to phish users and defraud them.
Threat actors are abusing commercial remote software like AnyDesk to phish users and defraud them.
The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding another layer of sophistication and stealth to the malware.
“This bootkit can intervene and contr…
A vulnerability classified as problematic has been found in Zoom Desktop Client, VDI Client and Meeting SDK on Windows. This affects an unknown part. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-20…
A vulnerability was found in Zoom Desktop Client, VDI Client and Meeting SDK on Windows. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to information disclosure.
This vulnerability is ha…
A vulnerability was found in Zoom Desktop Client, VDI Client, Meeting SDK and Rooms Client. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to untrusted search path.
This vulnerabili…
A vulnerability was found in Zoom Desktop Client, VDI Client, Mobile App, Meeting SDK and Rooms Client. It has been classified as problematic. Affected is an unknown function. The manipulation leads to improper authentication.
This vulnerability is tr…
A vulnerability in Roundcube webmail is being actively exploited and CISA is urging users to install an updated version.
A vulnerability was found in Zoom Desktop Client, VDI Client, Mobile App, Meeting SDK and Rooms Client and classified as problematic. This issue affects some unknown processing. The manipulation leads to business logic errors.
The identification of th…