Thursday, December 7, 2023

Synology NAS System Flaw Let Attackers Remotely Hijack the Admin Account

Synology DiskStation Manager (DSM) powers Synology NAS systems, offering remote file access and management. The DSM OS includes two default Linux users: 'admin' and...

Pro-Russia Hacker Groups Exploiting Winrar Flaw to Steal Login Credentials

A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831 using a Powershell script...

North Korean Hackers Exploiting TeamCity Flaw to Compromise Organizations Network

Microsoft has detected two North Korean nation-state threat actors, Diamond Sleet and Onyx Sleet, exploiting CVE-2023-42793. This vulnerability allows remote code execution on various...

ToddyCat APT Hackers Exploiting Vulnerable Microsoft Exchange Servers

ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently upgraded its arsenal of...

10 Best Vulnerability Scanner Tools For Penetration Testing – 2023

A Vulnerability Scanner Tool is one of the essential tools in IT departments Since vulnerabilities pop up every day thus leaving a loophole...

Hackers Abusing OAuth Token to Take Over Millions of Accounts

A new OAuth vulnerability has been discovered in three of the major extensions such as Grammarly, Vidio, and Bukalapak. These applications use the OAuth...

10 Best Free SSL Checker Tools 2023

SSL Checker helps you troubleshoot common SSL issues and SSL endpoint vulnerabilities. With the Free SSL Checker Tools, you need to submit the domain...
D-LINK SQL Injection Vulnerability

D-LINK SQL Injection Vulnerability Let Attacker Gain Admin Privileges

A security flaw called SQL injection has been uncovered in the D-Link DAR-7000 device.SQL injection is a malicious attack that exploits vulnerabilities in web...

Citrix Bleed: PoC Released for Citrix NetScaler Zero-Day Vulnerability

Two vulnerabilities were disclosed by Citrix, which were CVE-2023-4966 and CVE-2023-4967, with critical and high severities, respectively. Of these two, CVE-2023-4966 has been released...

Google Chrome Use-after-free Flaw Let Attackers Perform Heap Exploitation

The latest stable version of Google Chrome (version 118.0.5993.70) has been released for Mac and Linux.In contrast, the Windows version has been updated...

Managed WAF protection


Recent Articles