cyber security
How Hackers Using Packers To Hide Malware & Bypass Defenses
Hackers use packers maliciously to make their code difficult to recognize, as most antivirus programs are coded to be able to recognize these packers. The...
CVE/vulnerability
PoC Exploit Released For macOS Privilege Escalation Vulnerability
A new vulnerability has been discovered in macOS Sonoma that is associated with privilege escalation.This vulnerability has been assigned with CVE-2024-27842 and the...
cyber security
Hackers Exploit WordPress Plugin to Steal Credit Card Data
Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting WooCommerce online stores to steal credit card information.This alarming...
CVE/vulnerability
Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack
A new critical vulnerability has been discovered in Fluent Bit's built-in HTTP server, which has been termed "Linguistic Lumberjack" (CVE-2024-4323).Exploiting this vulnerability can also...
CVE/vulnerability
PoC Exploit Released For D-LINK RCE Zero-Day Vulnerability
Two critical vulnerabilities have been discovered in D-Link DIR-X4860 routers which were associated with Authentication bypass due to HNAP port and remote code execution....
Cyber Crime
Hackers Attacking Foxit PDF Reader Users To steal Sensitive Data
Researchers identified a PDF exploit targeting Foxit Reader users that uses a design flaw that presents security warnings with a default "OK" option, potentially...
CVE/vulnerability
Linksys Router Flaw Let Attackers Perform Command Injection, PoC Released
Linksys routers were discovered with two vulnerabilities: CVE-2024-33788 and CVE-2024-33789.These vulnerabilities were associated with Command Injection on Linksys routers.The severity of these vulnerabilities...
CVE/vulnerability
Multiple MySQL2 Flaw Let Attackers Arbitrary Code Remotely
The widely used MySQL2 has been discovered to have three critical vulnerabilities: remote Code execution, Arbitrary code injection, and Prototype Pollution.These vulnerabilities have been...