Vulnerability

Multiple Flaws in Dell PowerProtect Allow System CompromiseMultiple Flaws in Dell PowerProtect Allow System Compromise

Multiple Flaws in Dell PowerProtect Allow System Compromise

Dell has released a Critical Security Update (DSA-2025-022) for its PowerProtect Data Domain (DD) systems to address multiple vulnerabilities that could allow…

4 months ago
Alibaba Cloud Storage Flaw Exposes Data to Unauthorized UploadsAlibaba Cloud Storage Flaw Exposes Data to Unauthorized Uploads

Alibaba Cloud Storage Flaw Exposes Data to Unauthorized Uploads

A significant vulnerability has been discovered in the Alibaba Cloud Object Storage Service (OSS) that allows unauthorized users to upload…

4 months ago
CRLF Injection Vulnerabilities Identified in Popular .NET Libraries RestSharp and RefitCRLF Injection Vulnerabilities Identified in Popular .NET Libraries RestSharp and Refit

CRLF Injection Vulnerabilities Identified in Popular .NET Libraries RestSharp and Refit

Security researchers have uncovered critical CRLF (Carriage Return Line Feed) injection vulnerabilities in two widely used .NET libraries, RestSharp and Refit. These flaws,…

4 months ago
Yeti Forensic Platform Vulnerability Allows Attackers to Execute Remote CodeYeti Forensic Platform Vulnerability Allows Attackers to Execute Remote Code

Yeti Forensic Platform Vulnerability Allows Attackers to Execute Remote Code

A critical security flaw has been identified in the popular Yeti Forensic Intelligence platform, exposing its users to unauthenticated remote…

4 months ago
Cisco Webex Chat Vulnerabilities Expose Organization Chat Histories to AttackersCisco Webex Chat Vulnerabilities Expose Organization Chat Histories to Attackers

Cisco Webex Chat Vulnerabilities Expose Organization Chat Histories to Attackers

A major cybersecurity vulnerability in Cisco Webex Chat (previously known as IMI Chat) has raised alarming concerns after it was…

4 months ago
TeamViewer Clients Vulnerability Leads to Privilege EscalationTeamViewer Clients Vulnerability Leads to Privilege Escalation

TeamViewer Clients Vulnerability Leads to Privilege Escalation

TeamViewer, a widely used remote access software, has announced a critical vulnerability in its Windows clients. The company disclosed on…

4 months ago
Hackers Can Exploit AI Platform to Achieve Root Access via RCE VulnerabilityHackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability

Hackers Can Exploit AI Platform to Achieve Root Access via RCE Vulnerability

In a critical development within the AI industry, researchers at Noma Security have disclosed the discovery of a high-severity Remote…

4 months ago
Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure ADHackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Hackers Exploit OAuth 2.0 Code Flow Using AiTM Attack on Microsoft Azure AD

Security enthusiasts and professionals are turning their focus towards a new angle on phishing attacks in the identity and access…

4 months ago
Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security SectorsRussian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

A detailed analysis from Maverits, a leading cybersecurity firm, reveals a significant evolution in the strategies and objectives of APT28,…

4 months ago
New Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerabilityNew Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability

New Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability

Akamai's Security Intelligence and Response Team (SIRT) has uncovered a novel variant of the Mirai-based botnet malware, dubbed Aquabotv3, actively…

4 months ago