Vulnerability Analysis
BrutePrint – Bruteforce Attack to Bypass User Authentication on Smartphones
A novel assault named 'BrutePrint' has been unveiled by the joint efforts of Tencent Labs and Zhejiang University researchers, enabling the forceful extraction of...
Cyber Security News
CISA Warns that Hackers Actively Exploiting Samsung Vulnerability
CISA has issued a recent warning regarding a security flaw that impacts Samsung devices, enabling attackers to circumvent Android's address space layout randomization (ASLR)...
Cyber Security News
Hacking Groups Rapidly Weaponizing N-Day Vulnerabilities to Attack Enterprise Targets
Iranian hacker group 'Mint Sandstorm' is retaliating against recent attacks on its infrastructure by targeting critical US infrastructure, as recently discovered by cybersecurity researchers...
Cyber Attack
Critical VMware Vulnerabilities Let Attackers Execute Arbitrary Code
VMware Workstation, Workstation Pro, and Fusion have been subjected to several privately reported and fixed flaws. VMware has published a security advisory on the...
Cyber Security News
Super FabriXss Vulnerability in Microsoft Azure SFX Leads to Unauthenticated RCE
New information has surfaced regarding a security flaw patched by Microsoft in Azure Service Fabric Explorer (SFX). The vulnerability had the potential to result...
Cyber Security News
Hackers Exploit ProxyShell Flaws to Deploy ProxyShellMiner on Exchange Server
ProxyShellMiner is being distributed to Windows endpoints by a very elusive malware operation, according to Morphisec.To generate income for the attackers, "ProxyShellMiner" deploys cryptocurrency...
Exploit
Chinese Hackers Exploit FortiOS Zero-Day Vulnerability to Deploy New Malware
Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN that had only recently been discovered, and...
cyber security
Common Browser Security Vulnerabilities Used By Hackers To Take Over Browser
While using web browsers, there are security threats that, if not careful, can allow cybercriminals to take over the browser and steal information.To ensure...