Trusted Computing Group’s Trust Platform Module 2.0 reference library specification has been discovered with two buffer overflow vulnerabilities that threat actors can exploit to...
SysAid On-Prem software has been reported with a 0-day vulnerability determined during an incident response investigation.According to Microsoft, attackers are exploiting this zero-day vulnerability...
Researchers discovered a new firmware vulnerability in TP-link Archer C5 (v4) routers Let the attacker gain an Admin Password, and allow them remote takeover...
Researchers discovered a critical vulnerability in Microsoft Azure named "BlackDirect" that allows attackers to take over the Azure user's accounts and create the Token...
A critical remote code execution vulnerability that resides in the DHCP client allows attackers to take control of the system by sending malicious DHCP...
Researchers discovered a widespread Iranian malware campaign called Fox Kitten that targeting the several organization networks by exploiting the Vulnerabilities in VPN.The organization its...
Trail of Bits researcher Andreas Kellas recently disclosed a 22-Years-Old SQLite bug which has been tracked as "CVE-2022-35737." The SQLite database library has been...
A researcher discovered a critical Account takeover vulnerability in Facebook's Authorization feature "Login with Facebook" and, it allowed attackers to steal the Access_Token and...