Saturday, May 2, 2026
HomeUncategorized

Uncategorized

Threat Actor Promotes EagleSpy v5 RAT, Claiming Stealthy Android Device Access

A prominent cybercriminal known as "xperttechy" has surfaced on a well-known dark web forum, promoting a new iteration of Android malware named EagleSpy v5. Marketed as a "lifetime activated" remote access Trojan (RAT), EagleSpy v5 targets a wide range of Android devices, boasting advanced...

Zimbra Classic Web Client Vulnerability Allows Attackers to Execute Arbitrary JavaScript

Zimbra has released critical security patches addressing a severe stored cross-site scripting vulnerability in its Classic Web Client that could allow attackers to execute malicious JavaScript code on user systems. he company has issued fixes across multiple supported versions, including patches for both the...

Critical Convoy Vulnerability Allows Remote Code Execution on Servers

A critical directory traversal vulnerability has been discovered in Performave Convoy's LocaleController component, enabling unauthenticated remote attackers to execute arbitrary code on affected servers. The security vulnerability, tracked as GHSA-43g3-qpwq-hfgg and disclosed by researcher ericwang401 five days ago, impacts all Convoy installations running versions...

Google Cloud Donates A2A Protocol to Linux Foundation for Secure, Intelligent Communication

Google Cloud announced the transfer of its groundbreaking Agent2Agent (A2A) protocol to the Linux Foundation at Open Source Summit North America, establishing a new collaborative project aimed at fostering interoperable AI agent ecosystems. The donation creates an independent, vendor-neutral entity supported by major technology...

OPPO Clone Phones Weak WiFi Hotspot Poses Risk to Sensitive Data

A critical security vulnerability has been discovered in OPPO Clone Phone devices that could expose users' sensitive information through poorly secured WiFi hotspots used for file transfers. The vulnerability , designated as CVE-2025-27387 and published to the GitHub Advisory Database, represents a high-severity...

Xiaomi App Vulnerability Allows Hackers to Gain Unauthorized Access to Devices

Xiaomi has disclosed a critical security vulnerability in its interoperability application that could allow attackers to gain unauthorized access to users' devices. The vulnerability, identified as CVE-2024-45347 with a severe CVSS score of 9.6, affects millions of Xiaomi device users worldwide and highlights ongoing...