Divya

Divya

Critical Chrome Vulnerability Allows Attackers to Execute Arbitrary CodeCritical Chrome Vulnerability Allows Attackers to Execute Arbitrary Code

Critical Chrome Vulnerability Allows Attackers to Execute Arbitrary Code

Google has recently rolled out a critical security update for its Chrome browser, addressing vulnerabilities that could potentially allow attackers…

2 months ago
Cloudflare Reveals AI Labyrinth to Counter Automated AI AttacksCloudflare Reveals AI Labyrinth to Counter Automated AI Attacks

Cloudflare Reveals AI Labyrinth to Counter Automated AI Attacks

Cloudflare has unveiled AI Labyrinth, an innovative platform designed to combat AI-powered bots that relentlessly crawl and scrape data from websites…

2 months ago
WordPress Plugin Flaw Exposes 200,000+ Sites at Risk of Code ExecutionWordPress Plugin Flaw Exposes 200,000+ Sites at Risk of Code Execution

WordPress Plugin Flaw Exposes 200,000+ Sites at Risk of Code Execution

A critical security vulnerability has been discovered in the popular WordPress plugin, WP Ghost, which boasts over 200,000 active installations.…

2 months ago
China’s Baidu Compromised in Data Leak, Affecting UsersChina’s Baidu Compromised in Data Leak, Affecting Users

China’s Baidu Compromised in Data Leak, Affecting Users

Chinese tech giant Baidu has faced severe scrutiny after allegations emerged that a top executive's teenage daughter had accessed and…

2 months ago
New Browser-Based RDP Tool Enables Secure Remote Access to Windows ServersNew Browser-Based RDP Tool Enables Secure Remote Access to Windows Servers

New Browser-Based RDP Tool Enables Secure Remote Access to Windows Servers

Cloudflare has introduced a groundbreaking browser-based Remote Desktop Protocol (RDP) solution. This innovative tool allows users to securely access Windows…

2 months ago
Critical Next.js Middleware Vulnerability Allows Attackers to Bypass AuthorizationCritical Next.js Middleware Vulnerability Allows Attackers to Bypass Authorization

Critical Next.js Middleware Vulnerability Allows Attackers to Bypass Authorization

A severe vulnerability has been identified in Next.js, a popular React framework used for building web applications, under the designation…

2 months ago
Over 150 US Government Database Servers Vulnerable to Internet ExposureOver 150 US Government Database Servers Vulnerable to Internet Exposure

Over 150 US Government Database Servers Vulnerable to Internet Exposure

A recent open-source investigation has uncovered one of the largest exposures of US government data to cyber threats. More than…

2 months ago
Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch NowHackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

A concerning development has emerged with the active exploitation of Apache Tomcat servers through the recently disclosed vulnerability, CVE-2025-24813. This…

2 months ago
Veeam RCE Vulnerability Allows Domain Users to Hack Backup ServersVeeam RCE Vulnerability Allows Domain Users to Hack Backup Servers

Veeam RCE Vulnerability Allows Domain Users to Hack Backup Servers

Researchers uncovered critical Remote Code Execution (RCE) vulnerabilities in the Veeam Backup & Replication solution. These vulnerabilities, which include CVE-2025-23120,…

2 months ago
Apple Sued in Federal Court for Delaying Apple Intelligence Features  Apple Sued in Federal Court for Delaying Apple Intelligence Features  

Apple Sued in Federal Court for Delaying Apple Intelligence Features

Tech giant Apple has found itself at the center of a new legal battle after a class-action lawsuit was filed…

2 months ago