How to Secure Your Outlook from CVE-2023-23397- A Critical Elevation of Privilege Vulnerability in Outlook?

How to Secure Your Outlook from CVE-2023-23397- A Critical Elevation of Privilege Vulnerability in Outlook?

Mobile, Windows
It’s been a quarter now, but this critical Outlook vulnerability is still one of the hot topics in the security world. Upon public this flaw, there were many security firms, researchers, and threat hunters working on this Outlook vulnerability. Your guess is correct. We are talking about the Critical Microsoft Outlook vulnerability which is being tracked under the CVE ID- CVE-2023-23397. A vulnerability that could be easily exploitable by sending an Outlook message or calendar. Although it has been several weeks now, we still urge all Outlook users to secure your Outlook from CVE-2023-23397; successful exploitation of this vulnerability can result in unauthorized access to an organization’s environment by triggering a Net-NTLMv2 hash leak. Let’s understand some technical details about the CVE-2023-23397 vulnerability like, what is CVE-2023-23397, how it works,…
Read More
How To Prevent Your Apple Device From DoorLock Vulnerability?

How To Prevent Your Apple Device From DoorLock Vulnerability?

AI & Automation, Blockchain, Cloud & OS Platforms, Cyber Security, Futuristic Technologies, Mobile, Programming & Scripting
Researchers published a new vulnerability in Apple iOS devices that could let an attacker completely make the device unresponsive. The flaw is tracked by the name of ‘DoorLock’ was found in HomeKit of iOS, which allows an attacker to perform a denial of service attack on the vulnerable iOS device, which could make the device almost unresponsive. Since the bug is not fully fixed by Apple, it has become more important for all iOS users to be aware about the flaw and take the required steps to prevent their Apple devices from DoorLock vulnerability. We have published this post to educate you about the flaw and Let you know how to prevent your Apple device from DoorLock vulnerability. What Is Apple HomeKit? HomeKit is a central management system built by Apple to…
Read More
What Is A Privilege Escalation Attack? How To Prevent Privilege Escalation Attacks?

What Is A Privilege Escalation Attack? How To Prevent Privilege Escalation Attacks?

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Security, Linux, Mobile, Threats & Vulnerabilities, Vulnerabilities
Privilege escalation is a vulnerability used to gain access to applications, networks, and mission-critical systems. And privilege escalation attacks exploit security vulnerabilities and progressively increase criminal access to computer systems. These attacks are classified into vertical and horizontal privilege escalation based on the attack’s objective and strategy. There are several types of privilege escalation attacks, and each of them exploits a unique set of vulnerabilities having its own set of technical requirements. In this article, we’ll discuss privilege escalation attack in-depth, how it works, the types and impact of these attacks, and how to prevent privilege escalation attacks. Let’s get started.What Is A Privilege Escalation Attack?Privilege escalation is a common method attackers use to gain unauthorized access to systems and networks within a security perimeter. It’s an attack vector faced by many…
Read More
Unleashing The Power Of AI: Discover The Best ChatGPT Apps For Your Mobile

Unleashing The Power Of AI: Discover The Best ChatGPT Apps For Your Mobile

Best Reads, Cloud & OS Platforms, Futuristic Technologies, Mobile
Welcome to the world of AI-powered chat! In this blog, we delve into ChatGPT, an innovative language model that’s revolutionizing conversational experiences on mobile devices. We’ll explore the best ChatGPT apps for your mobile phones (iPhone and Android), discuss the pros and cons of using these powerful tools, as well as acquaint you with fascinating alternatives in the market. Read on to discover how leveraging ChatGPT technology can elevate your conversations with AI assistants and make everyday tasks more efficient and enjoyable! Before we jump exploring the best ChatGPT apps for your mobile phones, let’s see about the ChatGPT, its limitations, and reason to look for ChatGPT alternatives. What is ChatGPT? ChatGPT, or Chat-based Generative Pre-trained Transformer, is an advanced AI language model developed by OpenAI. It is designed to understand, generate,…
Read More
How to Protect Your Apple Devices From The Two 0-Day ACE Vulnerabilities in iOS, iPadOS, macOS, and Safari Web Browser?

How to Protect Your Apple Devices From The Two 0-Day ACE Vulnerabilities in iOS, iPadOS, macOS, and Safari Web Browser?

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Attacks, Cyber Security, Mobile, Network Security, Threats & Vulnerabilities
On 7th Apr, tech giant Apple rolled out security updates for their iOS, iPadOS, macOS, and Safari web browser platforms to protect your Apple devices from the two 0-day ACE vulnerabilities in iOS, iPadOS, macOS, and Safari web browsers. According to Google’s Threat Analysis Group (TAG), both ACE vulnerabilities are due to an out-of-bounds write and use after free issue exists in IOSurfaceAccelerator and WebKit in iOS, iPadOS, macOS, and Safari web browsers. These flaws let attackers execute arbitrary code with kernel privileges on vulnerable products using specially crafted web content. Apple didn’t disclose the technical details of the flaws to avoid the exploitation of the vulnerabilities. Let’s explore what Apple has shared about the two 0-Day ACE vulnerabilities in this post. A Short Introduction About Webkit Browser Engine and IOSurfaceAccelerator WebKit and IOSurfaceAccelerator are two…
Read More
Fleckpe- Android Subscription Trojans on Google’s Play Store

Fleckpe- Android Subscription Trojans on Google’s Play Store

Cloud & OS Platforms, Cyber Attacks, Cyber Security, Mobile, Threats & Vulnerabilities, Vulnerabilities
Google play store is the trusted place for Android users to download and install mobile apps safely, but what if the trusted source itself is spreading malicious applications? Every once in a while, we can find such kinds of malware lurking as harmless apps. The most popular service is the subscription trojans which steal money without user intervention.  In this article, we will discuss what Fleckpe (Android Subscription Trojans) is and how Fleckpe affects Android users. What is Fleckpe and How Does It Affect Android Users? Kaspersky has reported the discovery of a new Android malware called ‘Fleckpe’ on the Google Play store. The malware disguises itself as legitimate apps and has been downloaded over 620,000 times. Fleckpe falls under the category of subscription malware that charges users for premium…
Read More
Unleashing The Power Of AI: Discover The Best ChatGPT Apps For Your Mobile

Unleashing The Power Of AI: Discover The Best ChatGPT Apps For Your Mobile

Best Reads, Cloud & OS Platforms, Futuristic Technologies, Mobile
Welcome to the world of AI-powered chat! In this blog, we delve into ChatGPT, an innovative language model that’s revolutionizing conversational experiences on mobile devices. We’ll explore the best ChatGPT apps for your mobile phones (iPhone and Android), discuss the pros and cons of using these powerful tools, as well as acquaint you with fascinating alternatives in the market. Read on to discover how leveraging ChatGPT technology can elevate your conversations with AI assistants and make everyday tasks more efficient and enjoyable! Before we jump exploring the best ChatGPT apps for your mobile phones, let’s see about the ChatGPT, its limitations, and reason to look for ChatGPT alternatives. What is ChatGPT? ChatGPT, or Chat-based Generative Pre-trained Transformer, is an advanced AI language model developed by OpenAI. It is designed to understand, generate,…
Read More
How to Protect Your Apple Devices From 14 0-Day Vulnerabilities in iOS, iPadOS, and macOS

How to Protect Your Apple Devices From 14 0-Day Vulnerabilities in iOS, iPadOS, and macOS

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Attacks, Cyber Security, INFOSEC, Mobile, Threats & Vulnerabilities, Tutorials
On SEP 12th, tech giant Apple rolled out security updates for their iOS, iPadOS, and macOS platforms to protect your Apple devices from 14 0-day vulnerabilities in iOS, iPadOS, and macOS. Apple didn’t disclose the technical details about the flaws to avoid the exploitation of the vulnerabilities. Let’s explore what Apple has shared about the vulnerabilities in this post. Let’s start this post from listing the vulnerabilities. List of 0-Day Vulnerabilities in iOS, iPadOS, and macOS Apple has shared a long list of 0-day vulnerabilities in iOS, iPadOS, and macOS. Sl. No.CVE IDAffected OSDescriptionImpact1CVE-2022-32854All versions prior viOS 15.7 and viPadOS 15.7.All versions prior macOS Big Sur v11.7.This is an improper checks in Privacy preferences.Possible to bypass Privacy preferences.2CVE-2022-32911All versions prior viOS 15.7 and viPadOS 15.7.All versions prior macOS Big Sur v11.7.All versions prior…
Read More