Home Search
vulnerabilities - search results
If you're not happy with the results, please do another search
Apex Code Vulnerabilities Let Hackers Steal Salesforce Data
Hackers target Apex code vulnerabilities in Salesforce to exploit security weaknesses, gain unauthorized access to sensitive data, or manipulate the system.Apex is a powerful...
Google Chrome 122 Update Addresses Critical Security Vulnerabilities
Google has recently unveiled Chrome 122, a significant milestone for the widely used web browser.The most recent release, compatible with Windows, Mac, and Linux...
Splunk Patched Critical Vulnerabilities in Enterprise Security
Several vulnerabilities have been discovered in Splunk Enterprise Security and Splunk User Behavior Analytics (UBA), which existed in several third-party packages.The third-party package...
Microsoft’s 2023 Final Patch: 34 Vulnerabilities Including Critical 0-Day Fixed
Microsoft has released their patches for December 2023 as part of their Patch Tuesday. In this release, they have patched more than 34 vulnerabilities...
TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities
Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative targets. Outlook vulnerabilities offer:-Access to sensitive emails Access to sensitive informationWinRAR vulnerabilities...
North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques involving different...
117 Vulnerabilities Discovered in Microsoft 365 Apps
Microsoft 365 Apps is a suite of productivity tools that includes the following apps and services offered by Microsoft through a subscription service:-Microsoft TeamsOneDriveSharePointPowerPointOutlookWordExcelMicrosoft...
Critical AI Tool Vulnerabilities Let Attackers Execute Arbitrary Code
Multiple critical flaws in the infrastructure supporting AI models have been uncovered by researchers, which raise the risk of server takeover, theft of sensitive information, model poisoning, and...
Hackers Selling Exploits for Critical Vulnerabilities on the Dark Web
Dark forums and Telegram channels have become great places for threat actors to sell critical vulnerabilities and exploits.These vulnerabilities and exploits were associated...
Hackers Actively Exploiting Big-IP and Citrix Vulnerabilities
Experts issued security alerts concerning the ongoing exploitation of Big-IP (CVE-2023-46747, CVE-2023-46748) and Citrix (CVE-2023-4966) vulnerabilities.The publicly available Proof of Concepts (POCs) for these...