Exploit

JetBrains Warns of GitHub Plugin that Exposes Access Tokens

A critical vulnerability (CVE-2024-37051) in the JetBrains GitHub plugin for IntelliJ-based IDEs (2023.1 and later) exposed access tokens to malicious…

7 months ago

ALPHV Ransomware Deployment Started With RDP Access And ScreenConnect Installations

Ransomware is used by hackers to abuse victims' data, locking it until a ransom is paid. This method of cyber…

7 months ago

How Hackers Using Packers To Hide Malware & Bypass Defenses

Hackers use packers maliciously to make their code difficult to recognize, as most antivirus programs are coded to be able…

7 months ago

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege escalation. This vulnerability has been assigned…

7 months ago

Hackers Exploit WordPress Plugin to Steal Credit Card Data

Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting WooCommerce online stores to steal credit…

7 months ago

Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack

A new critical vulnerability has been discovered in Fluent Bit's built-in HTTP server, which has been termed "Linguistic Lumberjack" (CVE-2024-4323).…

7 months ago

PoC Exploit Released For D-LINK RCE Zero-Day Vulnerability

Two critical vulnerabilities have been discovered in D-Link DIR-X4860 routers which were associated with Authentication bypass due to HNAP port…

7 months ago

Hackers Attacking Foxit PDF Reader Users To steal Sensitive Data

Researchers identified a PDF exploit targeting Foxit Reader users that uses a design flaw that presents security warnings with a…

7 months ago

Linksys Router Flaw Let Attackers Perform Command Injection, PoC Released

Linksys routers were discovered with two vulnerabilities: CVE-2024-33788 and CVE-2024-33789. These vulnerabilities were associated with Command Injection on Linksys routers.…

8 months ago

Multiple MySQL2 Flaw Let Attackers Arbitrary Code Remotely

The widely used MySQL2 has been discovered to have three critical vulnerabilities: remote Code execution, Arbitrary code injection, and Prototype…

8 months ago