cybercory

#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

30 C
Dubai
Tuesday, February 24, 2026
cybercory
HomeTopics 1Application Security

Application Security

spot_imgspot_imgspot_imgspot_img

Urgent Patch Required: Critical Palo Alto Networks OS Flaw Under Active Attack

A recently discovered critical vulnerability in Palo Alto Networks' PAN-OS operating system is under active exploitation by attackers. This zero-day flaw, identified as CVE-2024-3400...

Update Now! Apple Patches Critical Vulnerabilities in Safari and macOS

Proactive security is paramount in today's ever-evolving cyber threat landscape. Recently, Apple released critical security updates addressing vulnerabilities in Safari and macOS. These updates...

Beware the Bite: Malicious Ads Spreading Stealer Malware Target Mac Users

Mac users, beware! Recent reports from Jamf Threat Labs reveal a rise in malicious advertising campaigns targeting macOS. These deceptive ads aim to distribute...

Vultur Makes a Nasty Comeback: Upgraded Android Banking Trojan on the Prowl

The Android banking landscape is facing a familiar foe with a renewed bite. Vultur, a notorious Android banking trojan, has resurfaced with a suite...

Chrome Shields Surfers Better: Google Unveils Enhanced Real-Time URL Protection

Surfing the web can feel like navigating a minefield these days. Phishing attacks are constantly evolving, and even the most cautious clickers can fall...

WordPress Pop-Up Peril: 3,000+ Sites Compromised Due to Plugin Flaw

WordPress website owners beware! A recent vulnerability in a popular plugin has exposed thousands of websites to potential compromise. Let's delve into the details...

Linux Beware: Magnet Goblin Deploys New NerbianRAT Variant

The financially motivated threat actor group, Magnet Goblin, has once again made headlines by deploying a new Linux variant of their custom malware, NerbianRAT....

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Must read

spot_imgspot_imgspot_imgspot_img