Thursday, April 25, 2024

Category

Vulnerabilities

Top Vulnerabilities Exploited in 2022 as revealed by FBI, CISA, and NSA

The year 2022 witnessed a surge in cyberattacks by malicious actors targeting unpatched, internet-facing systems. In a joint Cybersecurity Advisory (CSA), top cybersecurity agencies...

A word from our sponsor

spot_img

‘CosMiss’ vulnerability found in Microsoft Azure developer tool

Microsoft addressed a vulnerability affecting a tool used by developers within...

Unofficial fix emerges for Windows bug abused to infect home PCs with ransomware

A cybersecurity firm has issued another unofficial patch to squash a...

Everything you need to know about the OpenSSL 3.0.7 Patch

Vulnerability Details The vulnerability is a buffer overflow in the X.509 certificate...

What You Should Know about the New OpenSSL Vulnerability

TL;DR: If you use OpenSSL 3.0 or higher, prepare to upgrade to...

VMware warns of the public availability of CVE-2021-39144 exploit code

VMware warned of the availability of a public exploit for a...

Critical zero-day bug, first since Heartbleed, identified in OpenSSL

OpenSSL has a new “critical” bug. But it’s a secret—until next...

Apple fixes exploited iOS, iPadOS zero-day (CVE-2022-42827)

For the ninth time this year, Apple has released fixes for...

VMware bug with 9.8 severity rating exploited to install witch’s brew of malware

Hackers have been exploiting a now-patched vulnerability in VMware Workspace ONE...

Backdoor.Win32.Psychward.10 MVID-2022-0651 Remote Command Execution

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022Original source:...

WordPress Plugin ImageMagick-Engine 1.7.4 – Remote Code Execution (RCE) (Authenticated)

A remote code execution (RCE) vulnerability was discovered in Wordpress Plugin...