Divya

Divya

Hackers Exploit Azure App Proxy Pre-Authentication to Access Private NetworksHackers Exploit Azure App Proxy Pre-Authentication to Access Private Networks

Hackers Exploit Azure App Proxy Pre-Authentication to Access Private Networks

Hackers are exploiting a vulnerability in Microsoft's Azure App Proxy by manipulating the pre-authentication settings to gain unauthorized access to…

2 months ago
CISA Warns of Supply-Chain Attack Exploiting GitHub Action VulnerabilityCISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

CISA Warns of Supply-Chain Attack Exploiting GitHub Action Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm over a critical supply-chain attack affecting a widely used…

2 months ago
11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

Cybersecurity researchers have discovered that multiple state-sponsored threat actors have been exploiting an eight-year-old vulnerability in Windows shortcut files. This…

2 months ago
Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary CodeCritical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

Critical Synology Vulnerability Allows Remote Attackers to Execute Arbitrary Code

A critical vulnerability affecting Synology's DiskStation Manager (DSM) has been disclosed, allowing remote attackers to execute arbitrary code on vulnerable…

2 months ago
Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC ReleasedWindows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture NTLM hashes and potentially exploit them…

2 months ago
CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass ExploitCISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a severe vulnerability in Fortinet's FortiOS and…

2 months ago
Amazon Ends Local Voice Processing, Transitions Fully to CloudAmazon Ends Local Voice Processing, Transitions Fully to Cloud

Amazon Ends Local Voice Processing, Transitions Fully to Cloud

Amazon announced that it will discontinue the local voice processing feature for its AI assistant Alexa. This change, set to…

2 months ago
Google’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 BillionGoogle’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 Billion

Google’s Parent Alphabet in Talks to Acquire Cybersecurity Firm Wiz for $30 Billion

Alphabet, the parent company of Google, is reportedly in discussions to acquire Wiz, a leading cybersecurity firm, for a staggering…

2 months ago
Cloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum AttacksCloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum Attacks

Cloudflare Adopts Post-Quantum Cryptography to Combat Future Quantum Attacks

Cloudflare has announced the implementation of post-quantum cryptography across its services. This advancement is part of a broader effort to…

2 months ago
Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT InfrastructureHackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure

Hackers Exploit SSRF Vulnerability to Attack OpenAI’s ChatGPT Infrastructure

A critical cybersecurity alert has been issued following the active exploitation of a Server-Side Request Forgery (SSRF) vulnerability in OpenAI's…

2 months ago