Divya

Divya

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote ControlmySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

Supervisory Control and Data Acquisition (SCADA) systems play a pivotal role in managing critical infrastructure across sectors like energy, manufacturing,…

2 weeks ago
Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary FilesSante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it susceptible to severe security breaches. These…

2 weeks ago
Attackers Hide Malicious Word Files Inside PDFs to Evade DetectionAttackers Hide Malicious Word Files Inside PDFs to Evade Detection

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to deceive detection systems. This technique, confirmed…

2 weeks ago
US Sperm Donor Giant California Cryobank Hit by Data BreachUS Sperm Donor Giant California Cryobank Hit by Data Breach

US Sperm Donor Giant California Cryobank Hit by Data Breach

California Cryobank, a leading sperm donation facility based in Los Angeles, has been impacted by a significant data breach, potentially…

2 weeks ago
Cloudflare Introduces Cloudforce One to Detect and Analyze IoCs, IPs, and DomainsCloudflare Introduces Cloudforce One to Detect and Analyze IoCs, IPs, and Domains

Cloudflare Introduces Cloudforce One to Detect and Analyze IoCs, IPs, and Domains

Cloudflare, a leading web infrastructure and security company, has launched the Cloudforce One threat events platform, designed to revolutionize how…

2 weeks ago
New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome MalwareNew Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware

New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware

A threat intelligence researcher from Cato CTRL, part of Cato Networks, has successfully exploited a vulnerability in three leading generative…

2 weeks ago
Hackers Exploit Azure App Proxy Pre-Authentication to Access Private NetworksHackers Exploit Azure App Proxy Pre-Authentication to Access Private Networks

Hackers Exploit Azure App Proxy Pre-Authentication to Access Private Networks

Hackers are exploiting a vulnerability in Microsoft's Azure App Proxy by manipulating the pre-authentication settings to gain unauthorized access to…

2 weeks ago
CISA Warns of Supply-Chain Attack Exploiting GitHub Action VulnerabilityCISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical supply-chain attack affecting a widely used…

2 weeks ago
11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

Cybersecurity researchers have discovered that multiple state-sponsored threat actors have been exploiting an eight-year-old vulnerability in Windows shortcut files. This…

2 weeks ago
Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary CodeCritical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A critical vulnerability affecting Synology's DiskStation Manager (DSM) has been disclosed, allowing remote attackers to execute arbitrary code on vulnerable…

2 weeks ago