Home Search
0-Day - search results
If you're not happy with the results, please do another search
Hackers Exploit Atlassian Confluence Zero-day Flaw to Create Admin Account
The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an admin account on the...
Multiple Splunk Enterprise Flaws Let Attackers Execute Arbitrary Code
Splunk Enterprise has multiple vulnerabilities that can lead to Cross-site Scripting (XSS), Denial of Service (DoS), Remote code execution, Privilege Escalation, and Path Traversal....
10 Best Antivirus for Android – 100% Mobile Protection
Choosing the Best Antivirus for Android is the most important concern to protect your Android device from sophisticated cyber threats. An antivirus plays...
41 Zero-days Exploited In-the-Wild in 2022 – Google Report
In 2022, the detection of zero-day exploits in the wild decreased by 40% compared to the previous year. 41 in-the-wild 0-days were detected, the second-highest...
Firefox, ESR, and Thunderbird Memory Safety Bugs Could Allow Unauthorized Code Execution
Firefox has released patches for some of its high and moderate vulnerabilities in Firefox, ESR (Extended Support Release), and Thunderbird products. These vulnerabilities were...
Over 300,000+ Fortinet Firewalls are Vulnerable to a Critical RCE Flaw
The latest research shows Fortigate firewalls are vulnerable to remote code execution attempts.490,000 affected SSL VPN interfaces are exposed on the internet, and roughly...
Hackers Set Up Fake GitHub Repos to Deliver Malware Posing as Zero-day
Recently, the cybersecurity researchers at VulnCheck identified a growing trend of hackers masquerading as cybersecurity researchers on social platforms like Twitter and GitHub. While hackers...
Top 9 Best Remote Desktop Software for 2023
In this virtual world, remote Desktop software is playing a major role Over 70% of Americans have a computer with a broadband Internet connection....
Ghosttoken – A Zero-Day Bug Let Hackers Create Invisible Google Accounts
An Israeli cybersecurity company, Astrix's Security Research Group, discovered a 0-day vulnerability in Google's Cloud Platform (GCP) dubbed Ghosttoken on June 19, 2022, which...
3 iOS Zero-Click Exploits Exploited by NSO Group to Deploy Spyware
In 2022, NSO Group, the Israeli firm notorious for its spyware technology, reemerged with a slew of zero-click exploit chains designed for iOS 15...