Vulnerability

Google’s Gemini AI Vulnerability Lets Attackers Gain Control Over Users’ Queries

Researchers at HiddenLayer have unveiled a series of vulnerabilities within Google's Gemini AI that could allow attackers to manipulate user…

12 months ago

Multiple QNAP Vulnerabilities Let Attackers Inject Malicious Codes

QNAP has disclosed a series of vulnerabilities within its operating systems and applications that could potentially allow attackers to compromise…

12 months ago

PoC Exploit Released for OpenEdge Authentication Gateway & AdminServer Vulnerability

A Proof of Concept (PoC) exploit has been released for a vulnerability in the OpenEdge Authentication Gateway and AdminServer. This…

12 months ago

Vulnerability in 16.5K+ VMware ESXi Instances Let Attackers Execute Code

VMware's ESXi, Workstation, and Fusion products could allow attackers to execute malicious code on affected systems. Impacted VMware Products These…

12 months ago

Cisco SMB Wireless Access Points Flaw Let Attackers Inject Commands

Cisco has alerted its customers to critical vulnerabilities in the web-based management interface of its Small Business 100, 300, and…

1 year ago

Hackers Exploit WordPress Plugin Flaw to Deploy Godzilla Web Shell

Hackers have been found exploiting a vulnerability in a WordPress Plugin 3DPrint Lite(CVE-2021-4436) to deploy the notorious Godzilla Web Shell.…

1 year ago

CACTUS Hackers Exploiting Software Bug to Attack Corporate Networks

Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting a software vulnerability within 24 hours…

1 year ago

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019. The lawsuit claims that NSO took…

1 year ago

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled its latest iteration, version 4.14, introducing…

1 year ago

Lazarus Hackers Exploited Windows 0-Day to Gain Kernel read/write Access

The Lazarus Group, a well-known cybercriminal organization, has recently exploited a zero-day vulnerability in Windows to gain kernel privileges, a…

1 year ago