Attack

Trojan Gifthorse Infected Tens of Millions Android Devices Racking Millions

Trojan Gifthorse Infected Tens of Millions Android Devices Racking Millions

Malicious Android applications appear harmless when looking at the store description and requested permissions, but this false sense of confidence changes when users get charged month over month for the premium service they get subscribed to without their knowledge and consent.

Trojan Gifthorse Infected Tens of Millions Android Devices Racking Millions Read More »

Microsoft Exchange Flaw Leeks Login Credentials Across The Internet

Microsoft Exchange Flaw Leeks Login Credentials Across The Internet

An unpatched design flaw in the implementation of Microsoft Exchange’s Autodiscover protocol has resulted in the leak of tens of thousands of login names and passwords for Windows domains worldwide.
Every day Big Tech and Mass Media make it hard to find out what is going on with the internet. Honey Beez and Trip Elix have unique experiences to share in an unpaired podcast experience.

Join our community!!

Microsoft Exchange Flaw Leeks Login Credentials Across The Internet Read More »

New Windows Malware Targets Linux Subsystem To Evade Detection

New Windows Malware Targets Linux Subsystem To Evade Detection

New Python Based Malware Attack Windows Subsystem for Linux To Evade Detection
Republican Governors Association email server breached by state hackers
Windows 11 is no longer compatible with Oracle VirtualBox VMs
Every day Big Tech and Mass Media make it hard to find out what is going on with the internet. Honey Beez and Trip Elix have unique experiences to share in an unpaired podcast experience.

New Windows Malware Targets Linux Subsystem To Evade Detection Read More »

Apple Devices Vulnerable iOS,iPadOS, WatchOS,tvOS,Xcode,Safari, iTunes

Apple Devices Vulnerable iOS,iPadOS, WatchOS, tvOS,Xcode,Safari, iTunes

Multiple vulnerabilities have been discovered in Apple Products, the most severe of these could result in arbitrary code execution within the context of the application, an attacker gaining the same privileges as the logged-on user, or the bypassing of security restrictions. Depending on the permission associated with the application running the exploit, an attacker could then install programs; view, change, or delete data.

Apple Devices Vulnerable iOS,iPadOS, WatchOS, tvOS,Xcode,Safari, iTunes Read More »