Atlassian addressed four new RCE flaws in its products

2 years ago

Australian Software giant Atlassian addressed four critical Remote Code Execution (RCE) vulnerabilities in its products. Atlassian released security patches to address four…

CISA adds Qualcomm flaws to its Known Exploited Vulnerabilities catalog

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds four Qualcomm vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and…

Experts demonstrate a post-exploitation tampering technique to display Fake Lockdown mode

2 years ago

Researchers devised a new post-exploitation tampering technique to trick users into believing that their iPhone is in Lockdown Mode. Researchers…

GST Invoice Billing Inventory exposes sensitive data to threat actors

2 years ago

GST Invoice Billing Inventory, a business accounting app for small and medium businesses with over 1M downloads has left a…

Threat actors breached US govt systems by exploiting Adobe ColdFusion flaw

2 years ago

The U.S. CISA warns that threat actors are actively exploiting a critical vulnerability in Adobe ColdFusion to breach government agencies.…

ENISA published the ENISA Threat Landscape for DoS Attacks Report

2 years ago

ENISA published the ENISA Threat Landscape for DoS Attacks report to bring new insights to the DoS threat landscape. Denial-of-Service…

Russia-linked APT28 group spotted exploiting Outlook flaw to hijack MS Exchange accounts

2 years ago

Microsoft warns that the Russia-linked APT28 group is actively exploiting the CVE-2023-23397 Outlook flaw to hijack Microsoft Exchange accounts. Microsoft's…

Google fixed critical zero-click RCE in Android

2 years ago

Google fixed a critical zero-click RCE vulnerability (CVE-2023-40088) with the release of the December 2023 Android security updates. Google December…

New P2PInfect bot targets routers and IoT devices

2 years ago

Cybersecurity researchers discovered a new variant of the P2PInfect botnet that targets routers and IoT devices. Researchers at Cado Security Labs discovered…

Malvertising attacks rely on DanaBot Trojan to spread CACTUS Ransomware

2 years ago

Microsoft warns of ongoing malvertising attacks using the DanaBot malware to deploy the CACTUS ransomware. Microsoft uncovered ongoing malvertising attacks…

This website uses cookies.