Skip to content
Usman Ahzaz Mufti
Happening
Usman Ahzaz MuftiUsman Ahzaz Mufti
  • Cyber Security
  • Updates
  • Cyber Security
  • Updates

Category Archives: Cyber Security

You are here:
  1. Home
  2. Category "Cyber Security"

Google Chrome

Spam Extensions in Google Chrome Manipulates Users Towards Misleading Content/Applications

Cyber SecurityBy Usman Ahzaz MuftiMay 7, 2020Leave a comment

Google Chrome is one of the widely used web-browser, the perks of Google Chrome are its wide variety of extensions. Lately, Google addressed the issue with an updated Chrome Web Store Policy, which blocks the spam extensions which might be significantly a vulnerability to a user’s data. The extensions take the users to misleading content…

SaltStack

SaltStack Salt Detected with Critical Vulnerabilities

Cyber SecurityBy Usman Ahzaz MuftiMay 4, 2020Leave a comment

SaltStack salt is a Python Based, open-source software. The open-source framework was vulnerable from two points, where the attackers can exploit an arbitrary code in data centres through remove servers (A fix of the vulnerability was released in light of the version 3000.2). F-Secure specialists have found and worked through their research for the exploitation…

Vulnerability of Apple

Vulnerable to Cyber ​​Attacks? The Apple Image I / O Framework

Cyber Security, UpdatesBy Usman Ahzaz MuftiMay 3, 2020Leave a comment

Google Project Zero Team researched on a framework and found somewhat six vulnerabilities in the multimedia processing component of Apple. The vulnerabilities were originated from the Image I/O framework. The team found eight more of these fragilities in the OpenEXR library. Researchers managed to identify six vulnerabilities in Image I / O and eight more…

PowerPoint

PowerPoint is Vulnerable and puts users prone to attacks

Cyber Security, UpdatesBy Usman Ahzaz MuftiApril 12, 2020Leave a comment

A security-based researcher Usman Ahzaz Mufti, researched and opinionated that, a fresh manipulating vector permits an attacker to exploit a PowerPoint file, the exploitation is done as it downloads and installs a malware as the mouse is floated. Restriction in PowerPoint which forbids attaching a deleted file to the action called as ‘Follow the Hyperlink’…

12
Go to Top