The Google Project Zero “Record year for in-the-wild 0-days”, Google Project Zero said in its annual report for 2021, after 58 security flaws were discovered and publicly revealed. According to the information that has been revealed...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
A critical vulnerability was discovered in the Elementor Website Builder Plugin...
The CVE-2022-1329 Vulnerability An authenticated remote code execution flaw has been discovered in the popular WordPress website builder plugin Elementor, which may be exploited to take control of affected websites. Last week, Plugin Vulnerabilities...
Industroyer2 malware targets Ukraine’s energy provider
Industroyer2, a new strain of the malware, was used to infect a Ukrainian energy provider. ESET and the Ukrainian Computer Emergency Response Team (CERT-UA) collaborated on the discovery of the threat. Recently, Sandworm threat actor (which...
The FFDroider and Lightning info-stealers are on the loose
The FFDroider Stealer FFDroider and Lightning Stealer are two new types of malware that may steal data and launch subsequent attacks, according to cybersecurity experts. A report by Zscaler ThreatLabz researchers reveals that Info-Stealer malware...
AWS Lambda serverless platform malware targeted for the first time
Investigating what attackers are up to is a primary concern for cybersecurity researchers because if we don’t keep an eye on what cybercrooks are cooking up, effective cybersecurity is total fiction. In that context, a new report has revealed...
TotoLink routers vulnerabilities exploited by Beastmode Botnet
Between February and March 2022, a variant of the Mirai botnet known as Beastmode was seen exploiting recently reported vulnerabilities in TOTOLINK routers in order to infect unpatched devices and potentially expand its reach. As the FortiGuard Labs...
A new zero-day vulnerability called ‘Spring4Shell’ has been...
The Spring4Shell vulnerability A new RCE (Remote Code Execution) vulnerability in Spring Core, known as Spring4Shell, has been discovered, and the latest evidence suggests that it could affect real-world applications. Spring is a popular Java web...
Muhstik botnet targeting Redis servers using a recently revealed vulnerability...
The Muhstik Botnet Attacks on Redis servers performed by Muhstik, a well-known botnet that propagates by exploiting web application vulnerabilities, have been observed by security researchers. The CVE-2022-0543 vulnerability The servers of Redis...
Chrome Zero-Day bug was exploited by North Korean hackers to infiltrate...
North Korean government-backed hacking groups have exploited a recently discovered remote code execution flaw in the Chrome web browser, according to Google’s Threat Analysis Group (TAG) on Thursday. Tracked as CVE-2022-0609, the vulnerability...
Millions of Inspiron, Vostro, XPS, and Alienware Systems affected by new Dell...
New vulnerabilities in Dell BIOS, including some that might be exploited to execute code on affected computers, have been discovered by researchers. Thеre are five high-severity vulnerabilities, tracked as CVE-2022-24415, CVE-2022-24416, CVE-2022...