Millions of Linux Servers Under Worm Attack Via Exim Flaw

cyber

Attackers are exploiting a Linux Exim critical flaw to execute remote commands, download crypto miners and sniff out other vulnerable servers. A widespread campaign is exploiting a vulnerability in the Exim mail transport agent (MTA) to gain remote command-execution on victims’ Linux systems. Researchers say that currently more than 3.5 […]

Facebook to stop Huawei pre-installing apps on smartphones

cyber

Facebook is reportedly planning to stop Chinese tech giant Huawei from pre-installing its applications on future Huawei smartphones. According to Reuters, new Huawei smartphone models will not have Facebook, WhatsApp, or Instagram pre-installed. There will, or would have been, a business deal in place between Facebook and Huawei to allow […]

Unpatched Bug Let Attackers Bypass Windows Lock Screen On RDP Sessions

cyber

A security researcher today revealed details of a newly unpatched vulnerability in Microsoft Windows Remote Desktop Protocol (RDP). Tracked as CVE-2019-9510, the reported vulnerability could allow client-side attackers to bypass the lock screen on remote desktop (RD) sessions. Discovered by Joe Tammariello of Carnegie Mellon University Software Engineering Institute (SEI), the […]

Firefox Web Browser Now Blocks Third-Party Tracking Cookies By Default

cyber

As promised, Mozilla has finally enabled “Enhanced Tracking Protection” feature on its Firefox browser by default, which from now onwards would automatically block all third-party tracking cookies that allow advertisers and websites to track you across the web. Tracking cookies, also known as third-party cookies, allows advertisers to monitor your […]

Critical Flaws Found in Widely Used IPTV Software for Online Streaming Services

cyber

Security researchers have discovered multiple critical vulnerabilities in a popular IPTV middleware platform that is currently being used by more than a thousand regional and international online media streaming services to manage their millions of subscribers. Discovered by security researchers at CheckPoint, the vulnerabilities reside in the administrative panel of Ministra […]