Divya

Divya

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL CommandsTP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers to execute malicious commands, bypass…

3 weeks ago
Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!

Samsung One UI Vulnerability Leaks Sensitive Data in Plain Text With No Expiration!

A glaring vulnerability has come to light within Samsung's One UI interface: the clipboard history function stores all copied text,…

3 weeks ago
CISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting OpsCISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops

CISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops

 The Cybersecurity and Infrastructure Security Agency (CISA) has alerted its threat hunting teams to immediately discontinue use of two widely…

3 weeks ago
PoC Released for Critical Unauthenticated Erlang/OTP RCE VulnerabilityPoC Released for Critical Unauthenticated Erlang/OTP RCE Vulnerability

PoC Released for Critical Unauthenticated Erlang/OTP RCE Vulnerability

A critical remote code execution (RCE) vulnerability in Erlang/OTP’s SSH implementation (CVE-2025-32433) has now entered active exploit risk after researchers…

3 weeks ago
Critical Flaw in Windows Update Stack Enables Code Execution and Privilege EscalationCritical Flaw in Windows Update Stack Enables Code Execution and Privilege Escalation

Critical Flaw in Windows Update Stack Enables Code Execution and Privilege Escalation

A newly discovered vulnerability in the Windows Update Stack, tracked as CVE-2025-21204, has sent shockwaves through the cybersecurity community after…

3 weeks ago
WordPress Ad-Fraud Plugins Trigger Massive 1.4 Billion Daily Ad RequestsWordPress Ad-Fraud Plugins Trigger Massive 1.4 Billion Daily Ad Requests

WordPress Ad-Fraud Plugins Trigger Massive 1.4 Billion Daily Ad Requests

Cybersecurity researchers have uncovered a sprawling ad-fraud operation exploiting WordPress plugins to trigger over 1.4 billion fraudulent ad requests every…

3 weeks ago
Fake Certificate Issued for Alibaba Cloud After SSL.com Validation TrickFake Certificate Issued for Alibaba Cloud After SSL.com Validation Trick

Fake Certificate Issued for Alibaba Cloud After SSL.com Validation Trick

A critical vulnerability in SSL.com’s domain validation process allowed unauthorized parties to fraudulently obtain TLS certificates for high-profile domains, including…

3 weeks ago
HPE Performance Cluster Manager Vulnerability Enables Unauthorized AccessHPE Performance Cluster Manager Vulnerability Enables Unauthorized Access

HPE Performance Cluster Manager Vulnerability Enables Unauthorized Access

Hewlett Packard Enterprise (HPE) has disclosed a severe security flaw in its Performance Cluster Manager (HPCM) software that could allow…

3 weeks ago
MITRE Unveils D3FEND CAD Tool to Model Advanced Cybersecurity ScenariosMITRE Unveils D3FEND CAD Tool to Model Advanced Cybersecurity Scenarios

MITRE Unveils D3FEND CAD Tool to Model Advanced Cybersecurity Scenarios

MITRE has officially launched D3FEND CAD, an innovative tool designed to revolutionize how organizations model, analyze, and defend against sophisticated…

3 weeks ago
RedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack ToolsRedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack Tools

RedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack Tools

Security researchers have linked the notorious RedGolf hacking group to a wave of exploits targeting Fortinet firewall zero-days and the…

3 weeks ago