Malware analysis: Ragnarok ransomware

Ragnarok is recent ransomware used in targeted attacks against unpatched Citrix ADC servers vulnerable to the CVE-2019-19781 vulnerability. This article will analyze the details of this ransomware, how it works…

Google, Microsoft and Oracle generated most vulnerabilities in 2021

By Waqas When it comes to vulnerabilities; Google holds the top slot, Microsoft is on number two while Oracle is on number three H1 2021. This is a post from…

Netgear SOHO Security Bug Allows RCE, Corporate Attacks

Threat Post – Threat Post – The issue lies in a parental-control function that’s always enabled by default, even if users don’t configure for child security. A high-severity security bug…

CISA, FBI, NSA warn of increased attacks involving Conti ransomware

The Department of Homeland Security’s cybersecurity agency, the FBI and National Security Agency urged organizations in an alert Wednesday to update their systems amid an increase in Conti ransomware attacks.…

Unpatched Apple Zero-Day in macOS Finder Allows Code Execution

Threat Post – Threat Post – All a user needs to do is click on an email attachment, and boom – the code is silently executed without the victim knowing.…

VMware Warns of Ransomware-Friendly Bug in vCenter Server

Threat Post – Threat Post – UPDATE: Malicious actors are already scanning honeypots, looking for servers vulnerable to the critical arbitrary file upload flaw in vCenter servers’ Analytics service. VMware…

New version of Jupyter infostealer delivered through MSI installer

By Deeba Ahmed Originally, Jupyter infostealer is known for stealing data from popular browsers like Chrome and Firefox. Here’s what the new version of it does. This is a post…

Recently Patched Vulnerabilities in Ninja Forms Plugin Affect Over 1 Million Site Owners

WordFence –  WordFence –  On August 3, 2021 the Wordfence Threat Intelligence team initiated the responsible disclosure process for two vulnerabilities that were discovered in Ninja Forms, a WordPress plugin…

TikTok, GitHub, Facebook Join Open-Source Bug Bounty

Threat Post – Threat Post – The initiative, run by HackerOne, aims to uncover dangerous code repository bugs that end up going viral across the application supply-chain. Tech giants want…

Netflix errors – How to fix them

By Owais Sultan Netflix errors are a bane of existence for many Netflix users – Let’s dig it and see how one can fix this error. This is a post…