Eswar

Eswar

FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware AttacksFlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks

FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks

Ever since Russia's invasion of Ukraine on February 24, 2022, there have been heavy tensions between the nations and worldwide.…

10 months ago
Progress Telerik Report Server Flaw Let Attackers Bypass AuthenticationProgress Telerik Report Server Flaw Let Attackers Bypass Authentication

Progress Telerik Report Server Flaw Let Attackers Bypass Authentication

A new vulnerability related to authentication bypass was discovered in the Progress Telerik Report server. The CVE for this vulnerability…

10 months ago
PoC Exploit Released For macOS Privilege Escalation VulnerabilityPoC Exploit Released For macOS Privilege Escalation Vulnerability

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege escalation. This vulnerability has been assigned…

10 months ago
GNOME Remote Desktop Vulnerability Let Attackers Read Login CredentialsGNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to create graphical sessions on the system…

10 months ago
DNSBomb : A New DoS Attack That Exploits DNS QueriesDNSBomb : A New DoS Attack That Exploits DNS Queries

DNSBomb : A New DoS Attack That Exploits DNS Queries

A new practical and powerful Denial of service attack has been discovered that exploits DNS queries and responses. This new…

10 months ago
Critical Flaw In Confluence Server Let Attackers Execute Arbitrary CodeCritical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

Critical Flaw In Confluence Server Let Attackers Execute Arbitrary Code

The widely used team workspace corporate wiki Confluence has been discovered to have a critical remote code execution vulnerability. This…

11 months ago
Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution AttackCritical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack

Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack

A new critical vulnerability has been discovered in Fluent Bit's built-in HTTP server, which has been termed "Linguistic Lumberjack" (CVE-2024-4323).…

11 months ago
QakBot Malware Exploiting Windows zero-Day To Gain System PrivilegesQakBot Malware Exploiting Windows zero-Day To Gain System Privileges

QakBot Malware Exploiting Windows zero-Day To Gain System Privileges

In April 2024, security researchers revisited CVE-2023-36033, a Windows DWM Core Library elevation of privilege vulnerability that was previously discovered…

11 months ago
PoC Exploit Released For D-LINK RCE Zero-Day VulnerabilityPoC Exploit Released For D-LINK RCE Zero-Day Vulnerability

PoC Exploit Released For D-LINK RCE Zero-Day Vulnerability

Two critical vulnerabilities have been discovered in D-Link DIR-X4860 routers which were associated with Authentication bypass due to HNAP port…

11 months ago
Tycoon 2FA Attacking Microsoft 365 AND Google Users To Bypass MFATycoon 2FA Attacking Microsoft 365 AND Google Users To Bypass MFA

Tycoon 2FA Attacking Microsoft 365 AND Google Users To Bypass MFA

Tycoon 2FA, a recently emerged Phishing-as-a-Service (PhaaS) platform, targets Microsoft 365 and Gmail accounts, which leverage an Adversary-in-the-Middle (AitM) technique…

11 months ago