A critical vulnerability, now known as the “0.0.0.0 Day vulnerability,” has resurfaced after 18 years, impacting Google Chrome, Mozilla Firefox, and Apple Safari. This flaw, originally reported in 2008, allows malicious websites to bypass critical security mechanisms and interact with services on a local network, posing significant risks to Linux and macOS devices. Notably, this […]
Indian government organizations are under attack from a Pakistani hacking group (APT) using a novel malware called Disgomoji. This malware leverages a combination of an old Linux vulnerability (“Dirty Pipe”) and a unique command-and-control system based on emojis within the Discord messaging platform. Disgomoji: Espionage with a Smiley Face Disgomoji, identified by researchers at Blackberry, […]
The ever-evolving cyberwarfare landscape takes a sinister turn with the discovery of AcidPour, a new variant of the Russia-linked AcidRain data-wiping malware. This article delves into AcidPour’s capabilities, its connection to its predecessor, and the potential implications for critical infrastructure. The original AcidRain emerged in the early stages of the Russo-Ukrainian war, deployed against KA-SAT […]