Search results for Chong discovered

New SugarGh0st RAT Delivered via Malicious Windows...
Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control...
Source: Latest Hacker and Security News

Black Basta Ransomware Received Over 0 Million...
Black Basta, the fourth-most active ransomware strain with more than 329 victims,...
Source: Latest Hacker and Security News
-1.webp)
Notepad++ Input Validation Flaws Leads to uncontrolled...
Notepad++ has been discovered with an uncontrolled search path vulnerability, which...
Source: Latest Hacker and Security News

Exploring a Critical Risk in Google Workspace's Domain-Wide...
A security risk discovered in the Google Cloud Platform domain-wide delegation feature...
Source: Unit42

Critical Zoom Room bug allowed to gain access to Zoom...
A critical vulnerability in Zoom Room allowed threat actors to take over meetings...
Source: Security Affairs

USN-6494-2: Linux kernel vulnerabilities
Yu Hao discovered that the UBI driver in the Linux kernel did not properly
check...
Source: Ubuntu security notices

FjordPhantom Android malware uses virtualization to...
A new Android malware named FjordPhantom has been discovered using virtualization...
Source: BleepingComputer

Belgium Cybersec Community (Be.Cyber)
Join the Be.Cyber community! On the program: news and tools monitoring, mutual aid...

Google Researchers Find Out How ChatGPT Queries Can...
The LLMs (Large Language Models) are evolving rapidly with continuous advancements...
Source: Latest Hacker and Security News

Personal Information Sales Used as Bait to Distribute...
AhnLab Security Emergency response Center (ASEC) discovered a case of malware distribution...
Source: AhnLab

USN-6528-1: OpenJDK 8 vulnerabilities
It was discovered that the HotSpot VM implementation in OpenJDK did not
properly...
Source: Ubuntu security notices

USN-6527-1: OpenJDK vulnerabilities
Carter Kozak discovered that OpenJDK, when compiling with AVX-512
instruction support...
Source: Ubuntu security notices