Thursday, June 27, 2024

Synology NAS System Flaw Let Attackers Remotely Hijack the Admin Account

0
Synology DiskStation Manager (DSM) powers Synology NAS systems, offering remote file access and management. The DSM OS includes two default Linux users: 'admin' and...

Pro-Russia Hacker Groups Exploiting Winrar Flaw to Steal Login Credentials

0
A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831 using a Powershell script...

North Korean Hackers Exploiting TeamCity Flaw to Compromise Organizations Network

0
Microsoft has detected two North Korean nation-state threat actors, Diamond Sleet and Onyx Sleet, exploiting CVE-2023-42793. This vulnerability allows remote code execution on various...

ToddyCat APT Hackers Exploiting Vulnerable Microsoft Exchange Servers

0
ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently upgraded its arsenal of...

10 Best Vulnerability Scanner Tools For Penetration Testing – 2024

0
A Vulnerability Scanner Tool is one of the essential tools in IT departments Since vulnerabilities pop up every day thus leaving a loophole...

Hackers Abusing OAuth Token to Take Over Millions of Accounts

0
A new OAuth vulnerability has been discovered in three of the major extensions such as Grammarly, Vidio, and Bukalapak. These applications use the OAuth...

10 Best Free SSL Checker Tools 2024

0
SSL Checker helps you troubleshoot common SSL issues and SSL endpoint vulnerabilities. With the Free SSL Checker Tools, you need to submit the domain...
D-LINK SQL Injection Vulnerability

D-LINK SQL Injection Vulnerability Let Attacker Gain Admin Privileges

0
A security flaw called SQL injection has been uncovered in the D-Link DAR-7000 device.SQL injection is a malicious attack that exploits vulnerabilities in web...

Citrix Bleed: PoC Released for Citrix NetScaler Zero-Day Vulnerability

0
Two vulnerabilities were disclosed by Citrix, which were CVE-2023-4966 and CVE-2023-4967, with critical and high severities, respectively. Of these two, CVE-2023-4966 has been released...

Google Chrome Use-after-free Flaw Let Attackers Perform Heap Exploitation

0
The latest stable version of Google Chrome (version 118.0.5993.70) has been released for Mac and Linux.In contrast, the Windows version has been updated...

Managed WAF protection

Website

Recent Articles