Friday, March 29, 2024

Critical Cisco Security Flaws Allow Complete Router Firewall Takeover

0
Cisco patched critical vulnerabilities with Cisco Small Business that allows a remote attacker to take full control of the high-privileged account. Also fixed a...

CWE Top 25 – Mitre Released Top 25 Most Dangerous Software Bugs

0
Recently, Mitre released the top 25 most dangerous software bugs 2020; this list is a definitive list of the most popular and impactful issues...

Hackers Can Remotely Control Your Camera to Monitor and Record All Your Activities

0
A  dangerous flaw discovered in Popular Hanwha Smart camera's cloud server architecture that could allow an attacker to perform various malicious activities and to take...

Google Photos Vulnerability Allows Hackers To Track Location History

0
A vulnerability exists with the web version of Google photos allows malicious websites to extract the photos metadata information.Google photos will tag your photos...

New Android Zero-day Vulnerability Let Hackers Take Full Control the Samsung, Pixel, Huawei, Xiaomi,...

0
Researchers from Google project zero uncovered a critical zero-day vulnerability that affected at least 18 Android models including Samsung, Moto, Huawei, Pixel, Xiaomi and...

Magellan 2.0 – Multiple Chrome Vulnerabilities that Exists in SQLite Let Hackers Execute...

0
Critical SQLite vulnerabilities named "Magellan 2.0" discovered in World's most popular browser Google Chrome let hackers exploit the Chromium render process and execute the...

11 Bugs in Cisco Data Center Network Manager Let Hackers Perform RCE, SQL Injection,...

0
Cisco released a security update for several vulnerabilities that affected the Cisco products, including 3 critical remote code execution vulnerabilities that affected the Cisco...

Oracle Warns Active Exploitation of Recently Patched WebLogic RCE Flaw

0
Oracle warned that hackers actively attempting to exploit recently patched vulnerability CVE-2020-2883, which affects multiple versions of Oracle WebLogic Server.Oracle patched the vulnerability as...

What is Vulnerability Scoring? A Detailed Report to CVSS

1
A vulnerability is some aspect of a system functionality, architecture, or configuration that enables cybercriminals to execute attacks, exploit services, and steal data. There...

Apple Fixes iMessage Zero-Click Bug That Used to Deploy NSO Pegasus Spyware

0
Recently, Apple has published a security update for iPhone, iPad, Mac, and Apple Watch, in which it addresses a number of zero-day vulnerabilities, and...

Managed WAF protection

Website

Recent Articles