Hackers Exploiting High-Severity Zimbra Flaw to Steal Email Account Credentials
Zimbra CVE-2022-27824 has been added to the CISA's "Known Exploited Vulnerabilities" catalog as a new vulnerability. Hackers are actively exploiting it in attack activities,...
Chinese Hackers Using Log4Shell Exploit Tools to Perform Post-Exploitation Attacks
The cybersecurity firm, CrowdStrike has warned that Chinese hackers are using the Log4Shell exploit tools to perform various post-exploitation operations. The hacker group behind these...
Hackers Exploiting Log4j2 Vulnerability in The Wild To Deploy Ransomware
An emergency security update has been released recently by the Apache Software Foundation to fix a 0-day vulnerability in the popular Log4j logging library....
Hackers Are Exploiting a Flaw in Popular Billing Software to Deploy Ransomware
In various versions of the popular BQE Software BillQuick billing solution, the security analysts of Huntress Labs have warned of a critical SQL injection...
U.S. Cyber Command Warns of Active Mass Exploitation Attempts Targeting Confluence Flaws
The cybersecurity authorities of the U.S. Cyber command have recently been notified regarding the increase in the number of scans and attempts to exploit...
GitHub Updated Policies For Actively Used Exploits, Malware & Vulnerability Research
A set of all-new updates were being released by GitHub on Friday, all the updates pronounce that how the company will deal with all...
Windows PoC Exploit Released For The Most Critical Wormable RCE in HTTP Protocol Stack
Recently cybersecurity researchers has recently discovered a severe vulnerability in the IIS (Internet Information Services) of Windows. Though Microsoft has recently fixed this critical...
Hackers Exploit FortiOS Vulnerabilities to Access Government and Technology Services Networks
Recently, in March, the news got spread all over the internet that hackers are currently exploiting three known Fortinet FortiOS vulnerabilities.The case was initially...
Hackers Actively Scanning & Constantly Attempt To Exploit Citrix ADC Vulnerabilities
Recently, the Citrix published a set of 11 vulnerabilities in its most popular products that includes Citrix ADC as well, new research found that...