Thursday, April 18, 2024
Home Search

0-Day - search results

If you're not happy with the results, please do another search

Hackers Exploit Atlassian Confluence Zero-day Flaw to Create Admin Account

0
The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an admin account on the...

Multiple Splunk Enterprise Flaws Let Attackers Execute Arbitrary Code

0
Splunk Enterprise has multiple vulnerabilities that can lead to Cross-site Scripting (XSS), Denial of Service (DoS), Remote code execution, Privilege Escalation, and Path Traversal....

10 Best Antivirus for Android – 100% Mobile Protection

0
Choosing the Best Antivirus for Android is the most important concern to protect your Android device from sophisticated cyber threats. An antivirus plays...

41 Zero-days Exploited In-the-Wild in 2022 – Google Report

0
In 2022, the detection of zero-day exploits in the wild decreased by 40% compared to the previous year. 41 in-the-wild 0-days were detected, the second-highest...

Firefox, ESR, and Thunderbird Memory Safety Bugs Could Allow Unauthorized Code Execution

0
Firefox has released patches for some of its high and moderate vulnerabilities in Firefox, ESR (Extended Support Release), and Thunderbird products. These vulnerabilities were...

Over 300,000+ Fortinet Firewalls are Vulnerable to a Critical RCE Flaw

0
The latest research shows Fortigate firewalls are vulnerable to remote code execution attempts.490,000 affected SSL VPN interfaces are exposed on the internet, and roughly...

Hackers Set Up Fake GitHub Repos to Deliver Malware Posing as Zero-day

0
Recently, the cybersecurity researchers at VulnCheck identified a growing trend of hackers masquerading as cybersecurity researchers on social platforms like Twitter and GitHub. While hackers...

Top 9 Best Remote Desktop Software for 2023

1
In this virtual world, remote Desktop software is playing a major role Over 70% of Americans have a computer with a broadband Internet connection....

Ghosttoken – A Zero-Day Bug Let Hackers Create Invisible Google Accounts

0
An Israeli cybersecurity company, Astrix's Security Research Group, discovered a 0-day vulnerability in Google's Cloud Platform (GCP) dubbed Ghosttoken on June 19, 2022, which...

3 iOS Zero-Click Exploits Exploited by NSO Group to Deploy Spyware

0
In 2022, NSO Group, the Israeli firm notorious for its spyware technology, reemerged with a slew of zero-click exploit chains designed for iOS 15...

Managed WAF protection

Website

Recent Articles