Chrome
Chrome Zero-day Vulnerability Actively Exploited in the Wild
Google has announced the release of Chrome 128 to the stable channel for Windows, Mac, and Linux.This update, Chrome 128.0.6613.84 for Linux and...
CVE/vulnerability
Progress WhatsUp Gold Vulnerabilities Let Attackers Inject SQL Commands
The Progress WhatsUp Gold team confirmed the existence of critical vulnerabilities in all versions of their software released before 2024.0.0.If exploited, these vulnerabilities...
cyber security
Dell Power Manager Privilege Escalation Vulnerability
Dell Technologies has issued a critical security update for its Dell Power Manager software following the discovery of a significant vulnerability that could allow...
Cyber Attack
PG_MEM – A Malware Hide in Postgres Processes to Steal Data
Cybersecurity researchers at Aqua Nautilus have uncovered a new malware named PG_MEM that targets PostgreSQL databases.This sophisticated malware employs brute force attacks to gain...
Cyber Attack
Developers Beware! Fake Job Offers from Legitimate Github Address
A new phishing campaign is targeting developers by exploiting GitHub's legitimate infrastructure.This sophisticated attack involves fake job offers sent from genuine GitHub email...
cyber security
Critical Flaw in LiteSpeed Cache WordPress Plugin Exposes Millions of Websites to Attack
The Researcher team has identified and patched a critical privilege escalation vulnerability in the LiteSpeed Cache plugin.This plugin, installed on over 5 million WordPress...
cyber security
New Styx Stealer Attacking Users to Steal Login Passwords
A new cybersecurity threat, known as Styx Stealer, has emerged. It targets users by stealing sensitive data such as saved passwords, cookies, and autofill...
cyber security
2GB variant of Raspberry Pi Launched for Just $50
Raspberry Pi has announced the launch of a new 2GB variant of the Raspberry Pi 5, priced at an affordable $50.This release makes...