Vulnerability

Google Chrome Use After Free Flaw Let Attacker Hijack Browser

The latest stable channel update for Google Chrome, version 120.0.6099.199 for Mac and Linux and 120.0.6099.199/200 for Windows, is now available…

1 year ago

New Google Cookies Exploit Allows Access After Password Reset

A Critical Google Cookies exploit involves manipulating or stealing user cookies, which store authentication information, to gain unauthorized access to…

1 year ago

Multiple Flaws in Google Kubernetes Engine Let Attackers Escalate Privileges

Google Kubernetes Engine (GEK) has been detected with two flaws that a threat actor can utilize to create significant damage…

1 year ago

Critical Apache OfBiz Zero-Day Let Attackers Bypass Authentication

A new vulnerability has been discovered in Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. Apache OfBiz is used…

1 year ago

New Nim-Based Malware Delivered via Weaponized Word Document

Hackers use weaponized Word documents to deliver malicious payloads through social engineering.  By embedding malware or exploiting vulnerabilities in these…

1 year ago

Android Malware Actively Infecting Devices to Take Full Control

Android malware infects devices to take full control for various illicit purposes like:-  Stealing sensitive information Generating unauthorized financial transactions…

1 year ago

Hackers Exploiting Old Microsoft Office RCE Flaw to Deploy Agent Tesla Malware

It has been reported that malicious individuals are utilizing a malware called Agent Tesla to target Microsoft Office users using…

1 year ago

New SMTP Smuggling Attack Lets Hackers Send Spoofed Emails

SMTP (Simple Mail Transfer Protocol) smuggling is a technique where attackers exploit the inconsistencies in how proxy servers or firewalls…

1 year ago

Hackers Actively Exploiting ActiveMQ Vulnerability to Install Malware

Attackers have been exploiting the Apache ActiveMQ Vulnerability (CVE-2023-46604) to steal data and install malware constantly. Using the Apache ActiveMQ remote…

1 year ago

How Sandboxes Help Security Analysts Expose Script-Based Attacks

Cybercriminals employ numerous tactics to infiltrate endpoints and scripts are among the most destructive. You can trigger an infection chain…

1 year ago