“New Stealthy Shikitega Malware Targeting Linux Systems” is a brand-new piece of stealthy Linux malware that uses a multi-stage infection chain to infiltrate endpoints and IoT devices and deposit further payloads. In a fresh research released on Tuesday, AT&T Alien Labs stated that an attacker “may take complete control of the system, in addition to… …
Overview of Top Mobile Security Threats in 2022
Your smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking medical appointments. However, the threat landscape always reminds us how vulnerable smartphones can be. Discover the Most Significant Mobile Security Risks of 2022 in a Comprehensive Summary. Consider the recent discovery by Oversecured,… …
Check Point Software acquires Dome9 to beef up multi-cloud options
The Israel-based cyber security firm Check Point Software acquired compatriot Dome9 with multi-cloud capability which offers a SaaS platform that aims to visualize organizations’ security postures in the public cloud. Companies can have verifiable infrastructure security for every public cloud, including the behemoths of AWS, Azure and Google Cloud Platform. This shall enhance the ability… …
Unpatched Remote Hacking Flaw Disclosed in Fortinets FortiWeb WAF
Details have emerged about a new unpatched security vulnerability in Fortinet’s web application firewall (WAF) appliances that could be abused by a remote, authenticated attacker to execute malicious commands on the system. “An OS command injection vulnerability in FortiWeb’s management interface (version 6.3.11 and prior) can allow a remote, authenticated attacker to execute arbitrary commands… …
Top 30 Critical Security Vulnerabilities Most Exploited by Hackers
Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to swiftly weaponize publicly disclosed flaws to their advantage. “Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets,… …
Googles presence in China
A tie-up with large Chinese tech firms, like Tencent and Inspur, a major cloud solution and server provider, would give Google powerful allies as it attempts a broader return to mainland China, where it pulled its search engine in 2010 over censorship concerns. in addition to investing more in Chinese companies, Google has started rebuilding… …