Search results for:
Zoho
CVE/vulnerability
RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely
CISA's bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the wild by malicious threat...
CVE/vulnerability
Critical Flaw With Zoho Desktop Central Let Attackers to Bypass Authentication
A new critical vulnerability has been fixed that was detected in Zoho's Desktop Central and Desktop Central MSP; this security flaw allows an attacker...
Cyber Attack
Chinese APT Hackers Launching Mass Cyber Attack Using Cisco, Citrix, Zoho Exploits to Hack Gov & Private Networks
APT 41, Chinese hackers groups launched a massive cyberattack on dozens of countries around the globe using exploits that trigger the vulnerabilities in Cisco,...
CVE/vulnerability
Apache Fineract SQL Injection Vulnerability Allows Malicious Data Injection
The Apache Software Foundation has disclosed a critical SQL injection vulnerability in its widely utilized financial platform, Apache Fineract.
The flaw, tracked as CVE-2024-32838, affects multiple...
CVE/vulnerability
Volt Typhoon Attacking U.S. Critical Infra To Maintain Persistent Access
Volt Typhoon, a Chinese state-sponsored threat actor, targets critical infrastructure sectors like communications, energy, transportation, and water systems by pre-positions itself in target networks,...
Technology
Secure Cloud Storage for Businesses: How Companies Can Protect Themselves from Hacker Attacks
In today's digital age, cloud storage has become an essential part of business operations. The flexibility, scalability, and cost-efficiency offered by cloud solutions make...
Cyber Attack
Muddled Libra Hackers Using Pentesting Tools To Gain Admin Access
Threat actors use pentesting tools to identify vulnerabilities and weaknesses in target systems or networks.
These tools provide a simulated environment for testing potential...
Cyber Security News
New SMTP Smuggling Attack Lets Hackers Send Spoofed Emails
SMTP (Simple Mail Transfer Protocol) smuggling is a technique where attackers exploit the inconsistencies in how proxy servers or firewalls analyze and handle the...