Friday, March 29, 2024

Buffer Overflow Flaws in Trusted Platform Modules Allow Malicious Commands

0
Trusted Computing Group’s Trust Platform Module 2.0 reference library specification has been discovered with two buffer overflow vulnerabilities that threat actors can exploit to...

SysAid IT Service Software 0-day Exploited to Deploy Cl0p Ransomware

0
SysAid On-Prem software has been reported with a 0-day vulnerability determined during an incident response investigation.According to Microsoft, attackers are exploiting this zero-day vulnerability...

MITRE Releases Top 25 Most Dangerous Software Weaknesses

0
The top 25 most dangerous software weaknesses impacting software for the previous two calendar years have been published by MITRE as part of the...

A Zero-day Vulnerability in TP-link Router Let Hackers Gain Admin Privilege & Take Full...

0
Researchers discovered a new firmware vulnerability in TP-link Archer C5 (v4) routers Let the attacker gain an Admin Password, and allow them remote takeover...

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

0
If you use Trend Micro Apex One, you should know that the third-party Antivirus uninstaller feature may have a security hole. This flaw could...

Critical Vulnerability in Microsoft Azure Let Hackers Take Over the Complete Control of the...

0
Researchers discovered a critical vulnerability in Microsoft Azure named "BlackDirect" that allows attackers to take over the Azure user's accounts and create the Token...
Critical Remote Code Execution Vulnerability in DHCP Client Let Hackers  Take Control of the Network

Critical Remote Code Execution Vulnerability in DHCP Client Let Hackers Take Control of...

0
A critical remote code execution vulnerability that resides in the DHCP client allows attackers to take control of the system by sending malicious DHCP...

Fox Kitten – Iranian Malware Campaign Exploiting Vulnerable VPN Servers To Hack The Organizations...

0
Researchers discovered a widespread Iranian malware campaign called Fox Kitten that targeting the several organization networks by exploiting the Vulnerabilities in VPN.The organization its...

22-Yrs-Old SQLite Bug Let Hackers Perform Code Execution & DOS Attack On Control Programs

0
Trail of Bits researcher Andreas Kellas recently disclosed a 22-Years-Old SQLite bug which has been tracked as "CVE-2022-35737." The SQLite database library has been...

10 Yr-Old Facebook Bug Allow Hackers to Steal Access Token & Hijack Anyone’s Facebook...

0
A researcher discovered a critical Account takeover vulnerability in Facebook's Authorization feature "Login with Facebook" and, it allowed attackers to steal the Access_Token and...

Managed WAF protection

Website

Recent Articles