The vulnerability could let the hackers retrieve sensitive user data including messages, emails, images, videos and login details saved in the compromised devices
The flaw could let the attacker push a malicious link in the profile photo section of TrueCaller. Once any user views the attackers profile, his device gets infected
Changehero, Fox.Exchange and Morphtoken are now among the structures available on the portfolio's online interface.They do not require the intervention of third parties or traders.
Compressed and audio files let threat actors leverage severe, complex and multi-malware payload and are expected to be the favourites for cybercriminals