Vulnerability

Google Chrome Use-after-free Flaw Let Attackers Perform Heap Exploitation

The latest stable version of Google Chrome (version 118.0.5993.70) has been released for Mac and Linux. In contrast, the Windows…

1 year ago

MacOS “DirtyNIB” Vulnerability: Let Attackers Execute Malicious Code

A new zero-day vulnerability has been discovered in Apple’s macOS systems, which allows threat actors to execute code on behalf…

1 year ago

Maintainers of a Popular Open Source Tool Warns of Critical Curl Vulnerability

Two new vulnerabilities have been discovered in the widely used Curl tool. These two vulnerabilities are identified as CVE-2023-38545 and…

1 year ago

Video Surveillance Camera Flaw Allows Attackers to Change Passwords & Alarms

Pablo Martínez, a member of the Red Team at cybersecurity firm Entelgy Innotec Security, has uncovered significant vulnerabilities in low-cost…

1 year ago

Top 10 Cybersecurity Misconfigurations for Red and Blue Team Assessments

In a recent joint effort to bolster national cybersecurity, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security…

1 year ago

Hackers Exploit Atlassian Confluence Zero-day Flaw to Create Admin Account

The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an…

1 year ago

Microsoft Office XSS Flaw Let Attackers Execute Arbitrary Code

A recently discovered vulnerability in Microsoft Office Word has raised concerns over the security of the popular productivity suite.  This…

1 year ago

Top 7 REST API Security Strategies to Secure Your Endpoints

In today's REST API-driven landscape, most APIs are REST-based and widely utilized by web applications. These APIs are like versatile…

1 year ago

ShellTorch Flaw Exposes Thousands of AI Servers to RCE Attacks

ShellTorch Serve is an open-source model-serving library developed by PyTorch that simplifies the deployment of machine learning models for inference…

1 year ago

ZYXEL Buffer Overflow vulnerability Let Attacker Launch DoS Attack

ZYXEL has been discovered with a Buffer Overflow vulnerability on their ZYXEL-PMG2005-T20B device, which can result in a denial-of-service condition.…

1 year ago