Saturday, June 22, 2024

500 Million UC Browser Android Users are Vulnerable to Man-in-the-Middle Attacks

0
Researchers discovered various unusual activities in UC Browser for Android and it abusing the Google play policies and exposing more than 500  users to Man-in-the-Middle...

Verizon Fios Router Vulnerabilities Allows Attackers to Gain Complete Control Over the Network

0
Security researchers at Tenable uncovered multiple flaws with Verizon Fios Quantum Gateway router that allows a remote attacker to gain complete access over the...

WiFi Broadcasts in All Version of Android OS Leaking Sensitive Data Including IP Addresses,...

0
WiFi Broadcasts in Android OS Leaking sensitive data from a user’s Android device and the details about all the application that running on the...

EE’s 4G WiFi Modem Privilege Escalation Vulnerability Allows Let Attacker Bypass & Gain Windows...

0
New local privilege escalation vulnerability discovered in EE’s 4G WiFi Modem allow cybercriminals bypass the modem and gain the admin level privilege.EE is a...

Steam Windows Client Zero-day Privilege Escalation Vulnerability Affects Over 125 Million Users

0
The Steam windows client privilege escalation vulnerability allows an attacker with normal user privilege can run arbitrary code as an administrator.The Zero-day vulnerability was...

Cold Boot Attacks – Hackers Can Unlock All the Modern Computers and Steal Encryption...

0
Recent research reveals that a new Cold Boot Attacks allow let hackers steal the encryption keys, Passwords, credentials to corporate networks via new physical...

IRCTC Free Insurance Bug That Puts Millions of Passenger Data Under Risk

0
IRCTC fixed a critical security bug that allows attackers to steal passengers private information such as name, age, gender and insurance without user consent.It...

Jenkins Plugin Flaw Lets Attackers Gain Admin Access

0
A recent security advisory from Jenkins reported that they had fixed 24 vulnerabilities affecting multiple Jenkins plugins.This Flaw includes 5 High, 18 Medium,...
Apple bug bounty program

Apple to Pay Up to $1 Million For Hackers Who Can Gain Complete Control...

0
Apple expands its bug bounty program to cover all operating systems that include macOS, watchOS, tvOS, iPadOS, and iCloud along with the iOS bug...

Ongoing Attacks: Over 600+ Citrix Servers Compromised to Install Web Shells

0
A critical remote code execution (RCE) vulnerability identified as CVE-2023-3519 has been the subject of several attacks, which have already compromised and backdoored hundreds of Citrix...

Managed WAF protection

Website

Recent Articles