Vulnerability

MITRE Reveals EMB3D, a Threat Model for Embedded Devices in Critical Infrastructure

Red Balloon Security, Narf Industries, and MITRE collaborated to create the EMB3D Threat Model, which offers a shared knowledge of…

1 year ago

Top 3 Cybersecurity Trends for SME Business Leaders in 2024

As Cynet’s COO, my team and I get to work closely with risk management executives at small-to-medium enterprises (SMEs) around…

1 year ago

BazarCall Attack Weaponizing Google Forms to Appear Legitimate

A new type of phishing attack known as BazarCall has emerged, and it's using a clever technique to make it…

1 year ago

Sophos Firewall Code Injection Flaw: Let Attackers Execute Remote Code

A critical security flaw has been discovered in the Sophos Firewall User Portal and Webadmin, allowing hackers to execute malicious…

1 year ago

Microsoft’s 2023 Final Patch: 34 Vulnerabilities Including Critical 0-Day Fixed

Microsoft has released their patches for December 2023 as part of their Patch Tuesday. In this release, they have patched…

1 year ago

Over 50% of the Insider Attacks Uses Privilege Escalation Vulnerability

In the labyrinth of cybersecurity, the specter of insider threats emerges as a formidable adversary, wielding both malicious intent and…

1 year ago

Researchers Uncovered an Active Directory DNS spoofing exploit

In the intricate web of our interconnected world, the Domain Name System (DNS) stands as a linchpin, directing users to…

1 year ago

WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack

A critical remote code execution vulnerability has been patched as part of the Wordpress 6.4.2 version. This vulnerability exists in…

1 year ago

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in multiple products. The CVEs for these…

1 year ago

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat actors unauthorized access to sensitive data.…

1 year ago