Divya

Divya

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary CodeCritical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A critical vulnerability affecting Synology's DiskStation Manager (DSM) has been disclosed, allowing remote attackers to execute arbitrary code on vulnerable…

2 months ago
Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC ReleasedWindows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture NTLM hashes and potentially exploit them…

2 months ago
CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass ExploitCISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a severe vulnerability in Fortinet's FortiOS and…

2 months ago
Amazon Ends Local Voice Processing, Transitions Fully to CloudAmazon Ends Local Voice Processing, Transitions Fully to Cloud

Amazon Ends Local Voice Processing, Transitions Fully to Cloud

Amazon announced that it will discontinue the local voice processing feature for its AI assistant Alexa. This change, set to…

2 months ago
Google’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 BillionGoogle’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 Billion

Google’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 Billion

Alphabet, the parent company of Google, is reportedly in discussions to acquire Wiz, a leading cybersecurity firm, for a staggering…

2 months ago
Cloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum AttacksCloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum Attacks

Cloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum Attacks

Cloudflare has announced the implementation of post-quantum cryptography across its services. This advancement is part of a broader effort to…

2 months ago
Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT InfrastructureHackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure

Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure

A critical cybersecurity alert has been issued following the active exploitation of a Server-Side Request Forgery (SSRF) vulnerability in OpenAI's…

2 months ago
TruffleHog: New Burp Suite Extension for Secret Scanning ReleasedTruffleHog: New Burp Suite Extension for Secret Scanning Released

TruffleHog: New Burp Suite Extension for Secret Scanning Released

A new extension for Burp Suite has been released, integrating the powerful secret scanning capabilities of TruffleHog. This innovative integration…

2 months ago
Crypto Platform OKX Suspends Tool Abused by North Korean HackersCrypto Platform OKX Suspends Tool Abused by North Korean Hackers

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator tool. This decision comes on the…

2 months ago
Cobalt Strike 4.11 Released with Built-In Evasion Features for Red TeamsCobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams

Cobalt Strike 4.11 Released with Built-In Evasion Features for Red Teams

Cobalt Strike, a highly advanced threat emulation tool, has released version 4.11, packing a robust suite of features designed to…

2 months ago