-
PhpSpreadsheet Library Vulnerability Lets Attackers Inject Malicious HTML Input
A critical Server-Side Request Forgery (SSRF) vulnerability has been discovered in the popular PhpSpreadsheet library, allowing attackers to inject malicious HTML input when processing spreadsheet documents. The vulnerability, assigned C…
-
Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python
Critical Security Risk for Windows Users of WhatsApp Desktop with Python Installed Recent reports have highlighted a significant security vulnerability affecting Windows users who utilize WhatsApp Desktop and have Python installed on their systems. This risk poses a potential threat to user data and privacy.
-
Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python
A critical security risk has emerged for Windows users of WhatsApp Desktop who also have Python installed. Attackers can exploit a flaw in how WhatsApp Desktop handles .pyz (Python archive) files, delivering arbitrary code execution on the victim’s mac…
-
Users of WhatsApp Desktop on Windows Face Code Execution Risk Via Python
Critical Security Risk for Windows Users of WhatsApp Desktop with Python Installed Recent reports have highlighted a significant security vulnerability affecting Windows users of WhatsApp Desktop, particularly those who have Python installed on their systems.
-
ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners
A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA verification pages that employ the ClickFix social engineering tactic to deliver information stealers, ransomware, and …
-
Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection
Google Threat Intelligence Group (GTIG) has uncovered a multifaceted cyber espionage operation attributed to the PRC-nexus threat actor UNC6384, believed to be associated with TEMP.Hex (also known as Mustang Panda). This campaign, aligned with China…