Skip to content
Secmobile
  • Topics
    • File Sharing
    • NAS & Private Storage
    • Security
    • Technology
  • Hot
Search
Subscribe
Subscribe
Secmobile
Search

PyTorch’s Distributed RPC Framework Vulnerable to Remote Code Execution

A critical vulnerability has been found in the PyTorch machine learning library, allowing remote code execution. Designated CVE-2024-5480, the issue affects PyTorch’s Distributed RPC framework due to lack of function validation during RPC operations.

PyTorch’s Distributed RPC Framework Vulnerable to Remote Code Execution Read More »

Researchers Warn of Security Risks in VSCode Extensions

Researchers have identified numerous risky extensions in the Visual Studio Code marketplace.

Researchers Warn of Security Risks in VSCode Extensions Read More »

Critical Security Vulnerability Affecting PHP

A new critical security vulnerability, CVE-2024-4577, has been disclosed, which can be exploited under specific circumstances to achieve remote code execution.

Critical Security Vulnerability Affecting PHP Read More »

Hackers Target Python Developers with Fake PyPI Package

Hackers have targeted Python developers by creating a malicious PyPI package named “crytic-compilers,” designed to mimic the legitimate “crytic-compile” library used for compiling smart contracts.

Hackers Target Python Developers with Fake PyPI Package Read More »

Hundreds of WordPress Websites Targeted by Fake Google Chrome Update Attacks

More than 300 WordPress websites have been targeted by malicious Google Chrome update pop-ups. These pop-ups redirect website visitors to fake MSIX installers, leading to the deployment of information-stealing programs and remote access trojans.

Hundreds of WordPress Websites Targeted by Fake Google Chrome Update Attacks Read More »

Hackers Exploit Docker Vulnerabilities to Deploy Crypto Miners

A threat actor known as Commando Cat is linked to an ongoing cryptojacking campaign that exploits poorly secured Docker instances to deploy cryptocurrency miners for financial gain.

Hackers Exploit Docker Vulnerabilities to Deploy Crypto Miners Read More »

Hackers Exploit ThinkPHP Vulnerability to Deploy Web Shell

According to cybersecurity company Akamai, since October 17, 2023, hackers have been exploiting long-standing security vulnerabilities in ThinkPHP applications to deploy a web shell named Dama.

Hackers Exploit ThinkPHP Vulnerability to Deploy Web Shell Read More »

The U.S. Needs an Additional 225,000 Cybersecurity Workers

According to data from CyberSeek, the U.S. needs over 200,000 additional cybersecurity workers to address the talent gap.

The U.S. Needs an Additional 225,000 Cybersecurity Workers Read More »

Google Releases Android Update Fixing 37 Vulnerabilities

Google Releases Android Update Fixing 37 Vulnerabilities, including several high-severity privilege escalation vulnerabilities.

Google Releases Android Update Fixing 37 Vulnerabilities Read More »

Zero-Click Security Vulnerability Identified in TikTok

TikTok acknowledges the presence of a security issue, with hackers exploiting it to gain control over prominent accounts on the platform.

Zero-Click Security Vulnerability Identified in TikTok Read More »

Malicious Software Distribution via Cracked Microsoft Office

Cybercriminals distribute a combination of malware through cracked versions of Microsoft Office on torrent sites.

Malicious Software Distribution via Cracked Microsoft Office Read More »

Malicious Python Package Spread by Hackers via Stack Overflow

Cybersecurity researchers have issued a warning regarding the discovery of a new malicious Python package in the Python Package Index (PyPI) repository, aimed at cryptocurrency theft, as part of a broader malicious campaign.

Malicious Python Package Spread by Hackers via Stack Overflow Read More »

← Previous 1 … 4 5 6 Next →
  • Topics
    • File Sharing
    • NAS & Private Storage
    • Security
    • Technology
  • Hot
Subscribe
Subscribe
  • Topics
    • File Sharing
    • NAS & Private Storage
    • Security
    • Technology
  • Hot

Copyright © 2026 Secmobile | Powered by Secmobile