Vulnerability
SEE LATEST POSTS BY CATEGORY
Hacking and Security
Critical Azure HDInsight XSS Vulnerabilities Enable Malicious Payload Delivery
Azure HDInsight has been identified with multiple Cross-Site Scripting – XSS vulnerabilities related to Stored XSS and Refle…Cyber Security
15 More Vulnerabilities Added to 2023 CWE Top 25 Most Dangerous Software
The CVE MITRE foundation has released the list of “ On the Cusp ” in which many of the CWEs (Common Weakness Enumerations) …Linux
10 Best Linux Vulnerability Scanners to Scan Linux Servers – 2023
Regarding the security holes, this article can provide a solution to get the details about the most comprehensive Linux Vuln…Cyber Security
Google Uncovers 18 Zero-Day Vulnerabilities in Samsung’s Exynos Chipsets
The Project Zero team at Google has recently found and reported 18 zero-day vulnerabilities in Samsung’s Exynos chipsets, wh…Hackers
Chinese Hackers Exploiting 0-day Vulnerability in Fortinet Products
Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN …Netgear
NETGEAR Router Vulnerability Allowed Access to Restricted Services
A new report from Tenable, a Columbia, Maryland-based cybersecurity firm, outlined an emerging threat related to NETGEAR an…Linux
New Linux Flaw Lets Attackers Gain Full Root Privilege
The Threat Research Unit at Qualys’ has revealed how a new Linux flaw tracked as (CVE-2022-3328 ), may be combined with two…Cyber Security
New Google Chrome Zero-Day Bug Actively Exploited in Wild – Emergency Update!
Google released new security updates for actively exploited Chrome zero-day vulnerability that allows attackers to execute …Tech
Twitter Password Reset Bug Exposed User Accounts
Twitter logged out some users after addressing a bug where some Twitter accounts remained logged on some mobile devices aft…Hacking and Security
WordPress plugin vulnerability leaves sites open to total takeover
Security firm WordFence has warned of an actively exploited vulnerability in a widely-used WordPress plugin that could leav…Malware
Supercharged Version of Amadey Infostealer & Malware Dropper Bypasses AVs
A dangerous malware variant called "Amadey Bot" that has been largely dormant for the past two years has surfaced …Malware
Microsoft Office Most Exploited Software in Malware Attacks – Report
Research reveals that around 80% of all malware attacks used MS Office flaws. Atlas VPN has shared its findings for Q1 2022,…Cyber Security
Google pulls malware-infected apps in its Store, over 3 million users at risk
Google pulled 60 malware-infected apps from its Play Store, installed by more than 3.3 million punters, that can be used for…AWS
Authentication Bypass Bug Found In AWS IAM Authenticator for Kubernetes
A severe security bug existed in the AWS IAM Authenticator for Kubernetes. Exploiting this vulnerability could allow an adve…Hacking and Security