Wednesday, November 20, 2024

cyber security

Chrome Zero-day Vulnerability Actively Exploited in the Wild

Google has announced the release of Chrome 128 to the stable channel for Windows, Mac, and Linux.This update, Chrome 128.0.6613.84 for Linux and...

Progress WhatsUp Gold Vulnerabilities Let Attackers Inject SQL Commands

The Progress WhatsUp Gold team confirmed the existence of critical vulnerabilities in all versions of their software released before 2024.0.0.If exploited, these vulnerabilities...

Dell Power Manager Privilege Escalation Vulnerability

Dell Technologies has issued a critical security update for its Dell Power Manager software following the discovery of a significant vulnerability that could allow...

PG_MEM – A Malware Hide in Postgres Processes to Steal Data

Cybersecurity researchers at Aqua Nautilus have uncovered a new malware named PG_MEM that targets PostgreSQL databases.This sophisticated malware employs brute force attacks to gain...

Developers Beware! Fake Job Offers from Legitimate Github Address

A new phishing campaign is targeting developers by exploiting GitHub's legitimate infrastructure.This sophisticated attack involves fake job offers sent from genuine GitHub email...

Critical Flaw in LiteSpeed Cache WordPress Plugin Exposes Millions of Websites to Attack

The Researcher team has identified and patched a critical privilege escalation vulnerability in the LiteSpeed Cache plugin.This plugin, installed on over 5 million WordPress...

New Styx Stealer Attacking Users to Steal Login Passwords

A new cybersecurity threat, known as Styx Stealer, has emerged. It targets users by stealing sensitive data such as saved passwords, cookies, and autofill...

2GB variant of Raspberry Pi Launched for Just $50

Raspberry Pi has announced the launch of a new 2GB variant of the Raspberry Pi 5, priced at an affordable $50.This release makes...