by Liquid Video Technologies | Apr 9, 2021 | Cybersecurity, Data Breaches, Security, Security Breach
This appears to be one of the biggest ransomware demands to date, BleepingComputer reports. After inquiries, Acer did not provide a definitive answer if they had suffered a REvil ransomware attack. Instead, they said, “Companies like us are constantly under...
by Liquid Video Technologies | Apr 5, 2021 | Cybersecurity, Data Breaches, Security, Security Breach, zero trust
Google has disclosed that a now-patched vulnerability affecting Android devices that use Qualcomm chipsets is being weaponized by adversaries to launch targeted attacks using the zero-day vulnerability. Tracked as CVE-2020-11261 (CVSS score 8.4), the flaw concerns an...
by Liquid Video Technologies | Apr 2, 2021 | Access Control, Cybersecurity, Data Breaches, Network Security, Security, Security Breach
Cybersecurity researchers on Sunday disclosed multiple critical vulnerabilities in remote student monitoring software Netop Vision Pro that a malicious attacker could abuse to execute arbitrary code and take over Windows computers. “These findings allow for...
by Liquid Video Technologies | Mar 31, 2021 | Cybersecurity, Security, Security Breach
A pair of critical vulnerabilities in a popular bulletin board software called MyBB could have been chained together to achieve remote code execution (RCE) without the need for prior access to a privileged account. The flaws, which were discovered by independent...
by Liquid Video Technologies | Mar 29, 2021 | Cybersecurity, Data Breaches, Security, Security Breach
Cybersecurity researchers on Thursday disclosed a new attack wherein threat actors are leveraging Xcode as an attack vector to compromise Apple platform developers with a backdoor, adding to a growing trend that involves targeting developers and researchers with...
by Liquid Video Technologies | Mar 24, 2021 | Cybersecurity, Network Security, Security, Security Breach
Cybersecurity researchers on Monday disclosed a new wave of ongoing attacks exploiting multiple vulnerabilities to deploy new Mirai variants on internet-connected devices. “Upon successful exploitation, the attackers try to download a malicious shell script,...
Recent Comments