Vulnerability

Ivanti 0-Day Vulnerability Exploited in Wild-Patch Now

Ivanti released a critical security advisory addressing vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateways products. This advisory…

3 months ago

Oracle WebLogic Vulnerability Actively Exploited in Cyber Attacks – CISA

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the active exploitation of critical vulnerabilities in various…

3 months ago

Android Security Updates: Patch for Critical RCE Vulnerabilities

The January 2025 Android Security Bulletin has issued important updates regarding critical vulnerabilities that affect Android devices. Users are urged…

3 months ago

WordPress Plugin Vulnerability Exposes 3 Million Websites to Injection Attacks

A critical vulnerability has been identified in the popular UpdraftPlus: WP Backup & Migration Plugin, potentially impacting over 3 million…

3 months ago

Garak – An Open Source LLM Vulnerability Scanner for AI Red-Teaming

Garak is a free, open-source tool specifically designed to test the robustness and reliability of Large Language Models (LLMs). Inspired…

3 months ago

Windows Registry Privilege Escalation Vulnerability – PoC Released

Researchers have released a proof of concept (PoC) exploit for a critical privilege escalation vulnerability affecting Microsoft Windows. This vulnerability,…

3 months ago

ASUS Critical Vulnerabilities Let Attackers Execute Arbitrary Commands

In a recent security advisory, ASUS has alerted users to critical vulnerabilities affecting several of its router models.  These flaws,…

3 months ago

iTerm2 Emulator Vulnerability Let Attackers Access Sensitive User Data

 A critical vulnerability discovered in the popular macOS terminal emulator iTerm2 has raised concerns among cybersecurity experts and software users.…

3 months ago

Trend Micro Apex One Vulnerabilities Let Escalate Privilege

Trend Micro has addressed six high-severity vulnerabilities in its Apex One and Apex One as a Service product, which could allow attackers to escalate…

3 months ago

D-Link Warns of Botnets Exploiting End-of-Life Routers

D-Link warned users of several legacy router models about known vulnerabilities actively exploited by botnets. These devices, which have reached…

3 months ago