Skip to content
network security Page 125

network security

Apple Expands Spyware Alert System to Warn Users of Mercenary Attacks

Apple Expands Spyware Alert System to Warn Users of Mercenary Attacks

Apr 11, 2024NewsroomSpyware / Cyber Espionage Apple on Wednesday revised its documentation pertaining to its mercenary spyware threat notification system to mention that it alerts users when they may have been individually targeted by such… 

Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability

Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability

Apr 11, 2024NewsroomVulnerability / Threat Mitigation Fortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution. Tracked as CVE-2023-45590, the vulnerability carries a CVSS… 

‘eXotic Visit’ Spyware Campaign Targets Android Users in India and Pakistan

‘eXotic Visit’ Spyware Campaign Targets Android Users in India and Pakistan

Apr 10, 2024NewsroomMobile Security / Spyware An active Android malware campaign dubbed eXotic Visit has been primarily targeting users in South Asia, particularly those in India and Pakistan, with malware distributed via dedicated websites and… 

GitHub’s Fake Popularity Scam Tricking Developers into Downloading Malware

GitHub’s Fake Popularity Scam Tricking Developers into Downloading Malware

Apr 10, 2024NewsroomSoftware Security / Supply Chain Attack Threat actors are now taking advantage of GitHub’s search functionality to trick unsuspecting users looking for popular repositories into downloading spurious counterparts that serve malware. The latest… 

Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel

Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel

Apr 10, 2024NewsroomHardware Security / Linux Cybersecurity researchers have disclosed what they say is the “first native Spectre v2 exploit” against the Linux kernel on Intel systems that could be exploited to read sensitive data…