Weaponised XWorm RAT Builder Attacking Script Kiddies To Hack 18,000 Devices

2 weeks ago

A recent cybersecurity attack involving a Trojanized version of the XWorm Remote Access Trojan (RAT) builder has compromised over 18,000…

LockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment

2 weeks ago

A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware across a corporate environment. The attack,…

Apache Solr For Windows instances Vulnerability Allows Arbitrary Path Write-Access

2 weeks ago

A critical security vulnerability (CVE-2024-52012) affecting Apache Solr instances on Windows has been identified, allowing attackers to gain arbitrary file…

New SCAVY Framework to Detect Memory Corruption Privilege Escalation in Linux Kernel

2 weeks ago

 A breakthrough framework named SCAVY has been introduced to proactively detect memory corruption targets that could potentially lead to privilege escalation in…

Researchers Exploited Windows Charset Conversion Feature to Execute Remote Code

2 weeks ago

Researchers have exposed a systemic vulnerability within the Windows operating system, leveraging its "Best-Fit" charset conversion feature to bypass security…

GitLab Security Update – Patch for Multiple Vulnerabilities

2 weeks ago

GitLab, the widely adopted DevOps platform, has announced the immediate release of versions 17.8.1, 17.7.3, and 17.6.4 for both its Community Edition…

Critical Vulnerability in Meta Llama Framework Let Remote Attackers Execute Arbitrary Code

2 weeks ago

The Oligo Research team has disclosed a critical vulnerability in Meta’s widely used Llama-stack framework. This vulnerability, tracked as CVE-2024-50050, allows…

INE Security Alert: Expediting CMMC 2.0 Compliance

2 weeks ago

INE Security, a leading global provider of cybersecurity training and certifications, today announced a new initiative designed to accelerate compliance…

ERP System Development: A Guide to Building Scalable Business Solutions

3 weeks ago

With increased business development speed, such ERP software development is not a trend anymore, rather a necessity. It helps any…

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

3 weeks ago

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a colleague unearthed a major security vulnerability…