Remote Monitoring & Management software used in phishing attacks
Threat actors are abusing commercial remote software like AnyDesk to phish users and defraud them.
Threat actors are abusing commercial remote software like AnyDesk to phish users and defraud them.
The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding another layer of sophistication and stealth to the malware.
“This bootkit can intervene and contr…
A vulnerability classified as problematic has been found in Zoom Desktop Client, VDI Client and Meeting SDK on Windows. This affects an unknown part. The manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-20…
A vulnerability was found in Zoom Desktop Client, VDI Client and Meeting SDK on Windows. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to information disclosure.
This vulnerability is ha…
A vulnerability was found in Zoom Desktop Client, VDI Client, Meeting SDK and Rooms Client. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to untrusted search path.
This vulnerabili…
A vulnerability was found in Zoom Desktop Client, VDI Client, Mobile App, Meeting SDK and Rooms Client. It has been classified as problematic. Affected is an unknown function. The manipulation leads to improper authentication.
This vulnerability is tr…
A vulnerability was found in Zoom Desktop Client, VDI Client, Mobile App, Meeting SDK and Rooms Client and classified as problematic. This issue affects some unknown processing. The manipulation leads to business logic errors.
The identification of th…
A vulnerability in Roundcube webmail is being actively exploited and CISA is urging users to install an updated version.
A vulnerability has been found in Zoom Desktop Client, VDI Client, Video SDK, Mobile App, Meeting SDK and Rooms Client and classified as critical. This vulnerability affects unknown code. The manipulation leads to improper input validation.
This vulne…
A vulnerability, which was classified as problematic, was found in HIMA F30 03X YY COM, F30 03X YY CPU, F35 03X YY COM, F35 03X YY CPU, F60 CPU 03X YY COM, F60 CPU 03X YY CPU, F-COM 01, F-COM 01 coated, F-CPU 01, F-CPU 01 coated, X-COM 01 E YY, X-COM 0…