Skip to content
Secmobile
  • Security
  • Technology
  • Mobile
Search
Subscribe
Subscribe
Secmobile
Search

Google Releases Android Update Fixing 37 Vulnerabilities

Google Releases Android Update Fixing 37 Vulnerabilities, including several high-severity privilege escalation vulnerabilities.

Google Releases Android Update Fixing 37 Vulnerabilities Read More »

Zero-Click Security Vulnerability Identified in TikTok

TikTok acknowledges the presence of a security issue, with hackers exploiting it to gain control over prominent accounts on the platform.

Zero-Click Security Vulnerability Identified in TikTok Read More »

Malicious Software Distribution via Cracked Microsoft Office

Cybercriminals distribute a combination of malware through cracked versions of Microsoft Office on torrent sites.

Malicious Software Distribution via Cracked Microsoft Office Read More »

Malicious Python Package Spread by Hackers via Stack Overflow

Cybersecurity researchers have issued a warning regarding the discovery of a new malicious Python package in the Python Package Index (PyPI) repository, aimed at cryptocurrency theft, as part of a broader malicious campaign.

Malicious Python Package Spread by Hackers via Stack Overflow Read More »

Critical WordPress Plugin Vulnerabilities Exploited: Rogue Admin Accounts Created

Researchers warn of actively exploited high severity vulnerabilities in multiple WordPress plugins, allowing threat actors to create rogue admin accounts.

Critical WordPress Plugin Vulnerabilities Exploited: Rogue Admin Accounts Created Read More »

RedTail Malware Exploits Palo Alto Firewall Vulnerability

Akamai reports that RedTail cryptocurrency mining malware now exploits a new Palo Alto Networks firewall vulnerability (CVE-2024-3400, CVSS 10.0).

RedTail Malware Exploits Palo Alto Firewall Vulnerability Read More »

Upgrade Your Computer with 10 Free Software Tools to Boost Creativity and Productivity

Enhance your computer’s performance, creativity, and productivity with these top 10 free software tools. These tools not only enhance your computer’s capabilities but also offer a range of functions to help you efficiently complete various tasks.

Upgrade Your Computer with 10 Free Software Tools to Boost Creativity and Productivity Read More »

Critical Vulnerability in TP-Link Archer C5400X Routers

Critical vulnerability has been disclosed in the TP-Link Archer C5400X gaming router, potentially allowing remote code execution on affected devices.

Critical Vulnerability in TP-Link Archer C5400X Routers Read More »

Attack Exploits WordPress Plugin to Steal Card Data

A new cyberattack is exploiting the WordPress Code Snippets plugin to insert malicious PHP code into victim websites, collecting credit card data.

Attack Exploits WordPress Plugin to Steal Card Data Read More »

QNAP patches critical NAS vulnerabilities

QNAP released critical patches for QTS and QuTS hero systems, fixing vulnerabilities that could allow code execution on their NAS devices.

QNAP patches critical NAS vulnerabilities Read More »

YouTube Exploited for Phishing, Malware, and Deepfake Scams

According to Avast, YouTube has emerged as a new front for malicious actors deploying phishing, other malware, and fraudulent investment schemes.

YouTube Exploited for Phishing, Malware, and Deepfake Scams Read More »

Critical Vulnerability Found in Replicate AI Service

Security researchers have identified a critical security flaw within the artificial intelligence as a service provider Replicate.

Critical Vulnerability Found in Replicate AI Service Read More »

Post pagination
← Previous 1 … 4 5 6 Next →
  • Security
  • Technology
  • Mobile
Subscribe
Subscribe
  • Security
  • Technology
  • Mobile

Sign up to receive email updates, fresh news and more!

Email
The form has been submitted successfully!
There has been some error while submitting the form. Please verify all form fields again.

Copyright © 2025 Secmobile | Powered by Secmobile