Vulnerability

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own cloud vulnerabilities in their catalog. CVE-2023-6345 …

1 year ago

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially…

1 year ago

CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on Unitronics programmable logic controllers (PLCs) embedded…

1 year ago

Zyxel Command Injection Flaws Let Attackers Run OS Commands

Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor…

1 year ago

BLUFFS: Six New Attacks that Break Secrecy of Bluetooth Sessions

Six novel Bluetooth attack methods have been discovered, which were named BLUFFS (Bluetooth Forward and Future Secrecy) attacks. These attacks…

1 year ago

Google Workspace’s Design Flaw Allows Attacker Unauthorized Access

Recent years saw a surge in cloud tech adoption, highlighting the efficiency through tools like Google's Domain-Wide Delegation.  It enables…

1 year ago

Chinese Hackers Spent 2+Years Looting Secrets in Dutch Semiconductor Company

For over two years, a hacker group linked to China had uninterrupted access to NXP, the Dutch chip manufacturer's computer…

1 year ago

Dell Command Configure Vulnerability Let Attackers Compromise Vulnerable Systems

It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by…

1 year ago

Cisco Patched Products Vulnerable to HTTP/2 Rapid Reset Attack

A new high-severity vulnerability has been discovered in multiple Cisco products, which could potentially allow HTTP/2 Rapid Reset Attack. This…

1 year ago

Windows Hello Fingerprint Authentication Exploited on Microsoft, Dell, & Lenovo Laptops

Microsoft Windows Hello Fingerprint authentication was evaluated for security over its fingerprint sensors embedded in laptops. This led to the…

1 year ago