Vulnerability Analysis

SQLMAP-Detecting and Exploiting SQL Injection- A Detailed Explanation

Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking…

2 years ago

BrutePrint – Bruteforce Attack to Bypass User Authentication on Smartphones

A novel assault named 'BrutePrint' has been unveiled by the joint efforts of Tencent Labs and Zhejiang University researchers, enabling…

2 years ago

CISA Warns that Hackers Actively Exploiting Samsung Vulnerability

CISA has issued a recent warning regarding a security flaw that impacts Samsung devices, enabling attackers to circumvent Android's address…

2 years ago

Hacking Groups Rapidly Weaponizing N-Day Vulnerabilities to Attack Enterprise Targets

Iranian hacker group 'Mint Sandstorm' is retaliating against recent attacks on its infrastructure by targeting critical US infrastructure, as recently…

2 years ago

Critical VMware Vulnerabilities Let Attackers Execute Arbitrary Code

VMware Workstation, Workstation Pro, and Fusion have been subjected to several privately reported and fixed flaws. VMware has published a…

2 years ago

Super FabriXss Vulnerability in Microsoft Azure SFX Leads to Unauthenticated RCE

New information has surfaced regarding a security flaw patched by Microsoft in Azure Service Fabric Explorer (SFX). The vulnerability had…

2 years ago

Hackers Exploit ProxyShell Flaws to Deploy ProxyShellMiner on Exchange Server

ProxyShellMiner is being distributed to Windows endpoints by a very elusive malware operation, according to Morphisec. To generate income for…

2 years ago

Chinese Hackers Exploit FortiOS Zero-Day Vulnerability to Deploy New Malware

Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN that had only…

2 years ago

Common Browser Security Vulnerabilities Used By Hackers To Take Over Browser

While using web browsers, there are security threats that, if not careful, can allow cybercriminals to take over the browser…

2 years ago

Over 60,000 Online Exchange Servers Unpatched for RCE Vulnerability ProxyNotShell

One of the two security flaws targeted by ProxyNotShell exploits, CVE-2022-41082 RCE vulnerability, has not been patched on more than…

2 years ago