Synology NAS System Flaw Let Attackers Remotely Hijack the Admin Account
Synology DiskStation Manager (DSM) powers Synology NAS systems, offering remote file access and management. The DSM OS includes two default Linux users: 'admin' and...
Pro-Russia Hacker Groups Exploiting Winrar Flaw to Steal Login Credentials
A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831 using a Powershell script...
North Korean Hackers Exploiting TeamCity Flaw to Compromise Organizations Network
Microsoft has detected two North Korean nation-state threat actors, Diamond Sleet and Onyx Sleet, exploiting CVE-2023-42793. This vulnerability allows remote code execution on various...
ToddyCat APT Hackers Exploiting Vulnerable Microsoft Exchange Servers
ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently upgraded its arsenal of...
10 Best Vulnerability Scanner Tools For Penetration Testing – 2023
A Vulnerability Scanner Tool is one of the essential tools in IT departments Since vulnerabilities pop up every day thus leaving a loophole...
Hackers Abusing OAuth Token to Take Over Millions of Accounts
A new OAuth vulnerability has been discovered in three of the major extensions such as Grammarly, Vidio, and Bukalapak. These applications use the OAuth...
10 Best Free SSL Checker Tools 2023
SSL Checker helps you troubleshoot common SSL issues and SSL endpoint vulnerabilities. With the Free SSL Checker Tools, you need to submit the domain...
D-LINK SQL Injection Vulnerability Let Attacker Gain Admin Privileges
A security flaw called SQL injection has been uncovered in the D-Link DAR-7000 device.SQL injection is a malicious attack that exploits vulnerabilities in web...
Citrix Bleed: PoC Released for Citrix NetScaler Zero-Day Vulnerability
Two vulnerabilities were disclosed by Citrix, which were CVE-2023-4966 and CVE-2023-4967, with critical and high severities, respectively. Of these two, CVE-2023-4966 has been released...
Google Chrome Use-after-free Flaw Let Attackers Perform Heap Exploitation
The latest stable version of Google Chrome (version 118.0.5993.70) has been released for Mac and Linux.In contrast, the Windows version has been updated...