Divya

Divya

CISA Issues Alert on Langflow Vulnerability Actively Exploited in AttacksCISA Issues Alert on Langflow Vulnerability Actively Exploited in Attacks

CISA Issues Alert on Langflow Vulnerability Actively Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding an actively exploited vulnerability in Langflow, a popular…

2 weeks ago
Windows Deployment Services Hit by 0-Click UDP Flaw Leading to System FailuresWindows Deployment Services Hit by 0-Click UDP Flaw Leading to System Failures

Windows Deployment Services Hit by 0-Click UDP Flaw Leading to System Failures

A newly discovered pre-authentication denial-of-service (DoS) vulnerability in Microsoft’s Windows Deployment Services (WDS) exposes enterprise networks to instant system crashes via malicious…

2 weeks ago
Critical Microsoft 0-Click Telnet Vulnerability Enables Credential Theft Without User ActionCritical Microsoft 0-Click Telnet Vulnerability Enables Credential Theft Without User Action

Critical Microsoft 0-Click Telnet Vulnerability Enables Credential Theft Without User Action

A critical vulnerability has been uncovered in Microsoft’s Telnet Client (telnet.exe), enabling attackers to steal Windows credentials from unsuspecting users,…

2 weeks ago
Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000

Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000

A newly discovered dark web listing claims to sell a critical SS7 protocol exploit for $5,000, raising alarms about global…

2 weeks ago
MediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV ChipsetsMediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets

MediaTek Fixes Multiple Security Flaws in Smartphone, Tablet, and TV Chipsets

MediaTek, a leading provider of chipset technology for smartphones, tablets, AIoT, and smart TVs, has released critical patches addressing several…

2 weeks ago
xAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMsxAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMs

xAI Developer Accidentally Leaks API Key Granting Access to SpaceX, Tesla, and X LLMs

An employee at Elon Musk’s artificial intelligence venture, xAI, inadvertently disclosed a sensitive API key on GitHub, potentially exposing proprietary…

2 weeks ago
North Korean Hacker Tries to Infiltrate Kraken Through Job ApplicationNorth Korean Hacker Tries to Infiltrate Kraken Through Job Application

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by a suspected North Korean hacker posing…

2 weeks ago
Multiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin AccessMultiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access

Multiple Flaws in Tenda RX2 Pro Let Attackers Gain Admin Access

Security researchers have uncovered a series of critical vulnerabilities in the Tenda RX2 Pro Dual-Band Gigabit Wi-Fi 6 Router (Firmware…

2 weeks ago
Hackers Exploit Email Fields to Launch XSS and SSRF AttacksHackers Exploit Email Fields to Launch XSS and SSRF Attacks

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site scripting (XSS) and server-side request forgery (SSRF) attacks. These…

2 weeks ago
Luna Moth Hackers Use Fake Helpdesk Domains to Target VictimsLuna Moth Hackers Use Fake Helpdesk Domains to Target Victims

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed a surge in malicious activity tied…

2 weeks ago