Priya James
Cyber Security News
Phobos Ransomware Admin as Part of International Hacking Operation
The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian national accused of being a key figure in the notorious...
Cyber Security News
Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System
Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently confirmed a significant data breach that exposed the personal information...
CVE/vulnerability
Apache Kafka Vulnerability Let Attackers Escalate Privileges
A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow attackers to escalate privileges and gain unauthorized filesystem read access....
CVE/vulnerability
Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability
Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL injection vulnerability in its ADAudit Plus software.The flaw, identified...
Cyber Security News
Citrix Virtual Apps & Desktops Zero-Day Vulnerability Exploited in the Wild
A critical new vulnerability has been discovered in Citrix’s Virtual Apps and Desktops solution, which is widely used to facilitate secure remote access to...
CVE/vulnerability
Sonatype Nexus Repository Manager Hit by RCE & XSS Vulnerability
Sonatype, the company behind the popular Nexus Repository Manager, has issued security advisories addressing two critical vulnerabilities affecting Nexus Repository 2.x OSS/Pro versions.These...
CVE/vulnerability
GeoVision 0-Day Vulnerability Exploited in the Wild
Cybersecurity researchers have detected the active exploitation of a zero-day vulnerability in GeoVision devices, which the manufacturer no longer supports.The vulnerability, now designated as...
cyber security
Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely
A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious actors to remotely compromise affected devices.The vulnerability, identified as...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.