Divya

Divya

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC ReleasedWindows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture NTLM hashes and potentially exploit them…

2 weeks ago
CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass ExploitCISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a severe vulnerability in Fortinet's FortiOS and…

2 weeks ago
Amazon Ends Local Voice Processing, Transitions Fully to CloudAmazon Ends Local Voice Processing, Transitions Fully to Cloud

Amazon Ends Local Voice Processing, Transitions Fully to Cloud

Amazon announced that it will discontinue the local voice processing feature for its AI assistant Alexa. This change, set to…

2 weeks ago
Google’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 BillionGoogle’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 Billion

Google’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 Billion

Alphabet, the parent company of Google, is reportedly in discussions to acquire Wiz, a leading cybersecurity firm, for a staggering…

2 weeks ago
Cloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum AttacksCloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum Attacks

Cloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum Attacks

Cloudflare has announced the implementation of post-quantum cryptography across its services. This advancement is part of a broader effort to…

2 weeks ago
Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT InfrastructureHackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure

Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure

A critical cybersecurity alert has been issued following the active exploitation of a Server-Side Request Forgery (SSRF) vulnerability in OpenAI's…

2 weeks ago
TruffleHog: New Burp Suite Extension for Secret Scanning ReleasedTruffleHog: New Burp Suite Extension for Secret Scanning Released

TruffleHog: New Burp Suite Extension for Secret Scanning Released

A new extension for Burp Suite has been released, integrating the powerful secret scanning capabilities of TruffleHog. This innovative integration…

2 weeks ago
Crypto Platform OKX Suspends Tool Abused by North Korean HackersCrypto Platform OKX Suspends Tool Abused by North Korean Hackers

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator tool. This decision comes on the…

2 weeks ago
Cobalt Strike 4.11 Released with Built-In Evasion Features for Red TeamsCobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams

Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams

Cobalt Strike, a highly advanced threat emulation tool, has released version 4.11, packing a robust suite of features designed to…

2 weeks ago
PoC Exploit Released for Linux Kernel Use-After-Free VulnerabilityPoC Exploit Released for Linux Kernel Use-After-Free Vulnerability

PoC Exploit Released for Linux Kernel Use-After-Free Vulnerability

A proof-of-concept (PoC) exploit has been released for a use-after-free vulnerability in the Linux kernel, identified as CVE-2024-36904. This vulnerability…

2 weeks ago