Eli Cyber SecurityTwo critical command injection vulnerabilities in Fujitsu cloud storage system allow remote…Two bugs in the web interface of a cloud storage system would allow authenticated threat actors to read, write, and even destroy backed up…Jun 10, 2022Jun 10, 2022
Eli Cyber SecurityTwo critical command injection vulnerabilities in Fujitsu cloud storage system allow remote…Two bugs in the web interface of a cloud storage system would allow authenticated threat actors to read, write, and even destroy backed up…Jun 10, 2022Jun 10, 2022
Eli Cyber SecurityBluetooth signals on smartphones allow tracking any user’s location by exploiting BLEA group of researchers managed to show that signals emitted by electronic devices can be identified and tracked individually. Experts at…Jun 10, 2022Jun 10, 2022
Eli Cyber SecurityRansomware attack targeting public schools in New Jersey forces cancellation of final examsAdministrators of the Tenafly Public Schools, Bergen County, New Jersey, that the cybersecurity issue detected Thursday morning is a…Jun 9, 2022Jun 9, 2022
Eli Cyber SecurityEducation and telecommunication organizations based in Singapore, Hong Kong, Vietnam, Cambodia, and…Researchers at security firm SentinelLabs report the detection of a new Chinese-speaking hacking group identified as Aoqin Dragon and which…Jun 9, 2022Jun 9, 2022
Eli Cyber SecurityHow to hide spoofed malicious domain when users hover above a link in a phishing email in Microsoft…A recent report indicates that Microsoft Office applications could be exposed to homograph attacks based on internationalized domain names…Jun 3, 2022Jun 3, 2022
Eli Cyber SecurityCVE-2022–26134: Zero-day remote code execution vulnerability affecting Confluence Server and Data…Information security specialists at Volexity have discovered a remote code execution (RCE) vulnerability that resides in the latest, fully…Jun 3, 20221Jun 3, 20221
Eli Cyber SecurityYourCyanide, a new and sophisticated ransomware variant that integrates documents into PasteBin…Specialists at Trend Micro analyzed a set of CMD-based ransomware samples that appear to have advanced capabilities for stealing sensitive…Jun 2, 2022Jun 2, 2022
Eli Cyber SecurityWarning: New cyber criminal group Karakurt is extorting millions of companies around the worldThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a security alert about Karakurt, a cybercriminal group that…Jun 2, 2022Jun 2, 2022
Eli Cyber SecurityTexas shooter sent death threats via Facebook Messenger before the incident; Meta AI systems…It is well known that has implemented sophisticated technology to monitor private messages sent through Facebook and Instagram to identify…May 27, 2022May 27, 2022