Friday, April 19, 2024

Category

Vulnerabilities

Top Vulnerabilities Exploited in 2022 as revealed by FBI, CISA, and NSA

The year 2022 witnessed a surge in cyberattacks by malicious actors targeting unpatched, internet-facing systems. In a joint Cybersecurity Advisory (CSA), top cybersecurity agencies...

A word from our sponsor

spot_img

Cisco Issues Patch for Critical RCE Vulnerability in RCM for StarOS Software

Cisco Systems has rolled out fixes for a critical security flaw...

McAfee Agent bug lets hackers run code with Windows SYSTEM privilege

McAfee has patched a security vulnerability discovered in the company's McAfee Agent...

Google Details Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers

An exploration of zero-click attack surface for the popular video conferencing...

Cybersecurity Experts Concerns Over 2022 Beijing Olympics app

A group of cybersecurity experts have voiced their concerns over the...

Beware Of New RDP Exploit, says Avast

The often-exploited Remote Desktop Protocol (RDP) is once again in the news. This...

Safari 15 Vulnerability Allows Cross-Site Tracking of Users

A vulnerability in Apple’s implementation of the IndexedDB API in Safari...

Linux full-disk encryption bug fixed – patch now!

Lots of people “run Linux” without really knowing or caring –...

Three Plugins with Same Bug Put 84K WordPress Sites at Risk

Researchers discovered vulnerabilities that can allow for full site takeover in...

WordPress Core 5.8.2 – ‘WP_Query’ SQL Injection [PoC]

# Exploit Title: WordPress Core 5.8.2 - 'WP_Query' SQL Injection # Date:...

Orca Security Research Team Discovers AWS Zero-Day Vulnerability

The cloud environment relies on a few core principles. One of...