Wednesday, April 17, 2024

New SharePoint Technique Lets Hackers Bypass Security Measures

Two new techniques uncovered in SharePoint enable malicious actors to bypass traditional security measures and exfiltrate sensitive data without triggering standard detection mechanisms.Illicit...

HTTP/2 Vulnerability Let Hackers Launch DOS Attacks on Web Servers

Researchers identified a significant vulnerability within the HTTP/2 protocol, potentially allowing hackers to launch Denial of Service (DOS) attacks on web servers.The vulnerability...
Multiple CData Vulnerabilities

Multiple CData Vulnerabilities Let Attackers Bypass Security Restrictions

A path traversal vulnerability was discovered in the Java versions of multiple CData products when using the embedded Jetty server, allowing remote attackers to...

Multiple Cisco Small Business Routers Vulnerable to XSS Attacks

Cisco has alerted its customers about a critical vulnerability affecting several Small Business RV Series Routers models.This vulnerability, CVE-2024-20362, poses a significant risk, allowing...

AI-As-A-Service Providers Vulnerability Let Attackers Perform Cross-Tenant Attacks

The fast acceptance of AI has serious security issues, as this necessitates strict security measures to be put in place for the protection of...
Gesture Jacking

Gesture Jacking – New Attack That Deceives Website Visitors

The Web Platform is incredibly powerful, but regrettably, malicious websites will do all in their capacity to misuse it.To prevent such exploitation, blocking...

ZENHAMMER – First Rowhammer Attack Impacting Zen-based AMD Platforms

Despite AMD's growing market share with Zen CPUs, Rowhammer attacks were absent due to challenges in reverse engineering DRAM addressing, synchronizing with refresh commands,...

17,000+ Microsoft Exchange Servers Vulnerable to Multiple Critical Vulnerabilities

Federal Office for Information Security (BSI) in Germany has announced that at least 17,000 Microsoft Exchange servers across the country are exposed to one...

CISA & FBI Warns that Hackers Use SQL Injection Vulnerabilities to hack Servers

Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have warned technology manufacturers and their customers about the persistent threat...

One-Click AWS Vulnerability Let Attackers Takeover User’s Web Management Panel

Tenable Research has identified a critical vulnerability within the AWS Managed Workflows for Apache Airflow (MWAA) service, which they have named "FlowFixation."This vulnerability...

Managed WAF protection


Recent Articles