BIG-IP Monitor Configuration  Vulnerability
Autust 2022

BIG-IP Monitor Configuration Vulnerability

In BIG-IP Versions 16.1.x before 16.1.3.1, 15.1.x before 15.1.6.1, 14.1.x before 14.1.5.1, and all versions of 13.1.x, an authenticated attacker with Resource Administrator or Manager privileges can create or modify existing monitor objects in the Co...

BLACK BASTA Ransomware
June 2022

BLACK BASTA Ransomware

Black Basta a new ransomware is focused on Windows platform its new variants targeting ESXi virtual machines running on Linux servers that facilitates the attackers with encrypting multiple servers with one command are also developed. ...

HCL DX Serious Vulnerabilities
January 2022

HCL DX Serious Vulnerabilities

HCL Digital Experience (DX), a platform for building and managing web portals, contained multiple vulnerabilities that could potentially lead to remote code execution (RCE), researchers claim....

Subdomain Takeover Vulnerability
December 2021

Subdomain Takeover Vulnerability

A subdomain takeover vulnerability in a popular WordPress hosting platform could allow an attacker to deploy malicious code to a victim by impersonating a legitimate website, a security researcher claims....

Log4Shell Critical Vulnerability
December 2021

Log4Shell Critical Vulnerability

The maintainers of popular Java logging library Apache Log4j have rushed out a patch for a critical vulnerability that could lead to remote code execution (RCE) in numerous applications....

CKEditor XSS Threat to Drupal
November 2021

CKEditor XSS Threat to Drupal

Drupal, the widely used web content management system (CMS), has released security updates due to vulnerabilities in CKEditor, a third-party rich text editor bundled with Drupal....

Cachet RCE Vulnerabilities
October 2021

Cachet RCE Vulnerabilities

Multiple security vulnerabilities in open source status page system “Cachet” could allow an attacker to execute arbitrary code and steal sensitive data, researchers have warned....

Spook.js Google Chrome  Vulnerability
September 2021

Spook.js Google Chrome Vulnerability

A newly discovered side-channel attack targeting Google Chrome can allow an attacker to overcome the web browser’s security defences to retrieve sensitive information using a Spectre-style attack....

Cisco Critical Vulnerability
September 2021

Cisco Critical Vulnerability

A critical vulnerability in a Cisco product designed to help service providers and enterprises deploy virtualized networks can allow unauthenticated actors to bypass authentication....

LockBit 2.0 Ransomware Attack
August 2021

LockBit 2.0 Ransomware Attack

The LockBit ransomware-as-a-service (RaaS) gang has recently published the name and logo of a global business consulting firm with an insider track on some of the world’s biggest, most powerful companies....

VMware Vulnerability
July 2021

VMware Vulnerability

A vulnerability has been reported in VMware Tools for Windows, VMRC for Windows and VMware App Volumes was software that could allow a remote attacker to escalate privileges on the targeted system....

Artiricial Intelligence Attacks
June 2021

Artiricial Intelligence Attacks

Hackers are taking advantage of artificial intelligence technology to create links to help them get into any system. This is the technology that many cybersecurity companies use to combat hackers. ...

IOT Device Attacks
April 2021

IOT Device Attacks

In the past few years, many of the new devices connected to the Internet have not been personal computers, but rather a variety of devices embedded with Internet connectivity and functions. ...

BleedingTooth Triple Threat
April 2021

BleedingTooth Triple Threat

The three vulnerabilities associated with BleedingTooth can be found in CVE-2020- 12351, CVE-2020-12352, and CVE-2020-24490. Each of these vulnerabilities affects BlueZ, the official Linux Bluetooth protocol stack. ...

SolarWinds Cyber-attack
January 2021

SolarWinds Cyber-attack

The Russia-linked hackers behind a widespread cyber-intrusion into U.S. corporate and government systems were able to access internal systems within Microsoft Corp. and view internal source code, used to build software products, the company said Thur...

Adrozek Malware
December 2020

Adrozek Malware

Microsoft warned of a new malware named Adrozek that infects devices and hijacks Chrome, Edge, and Firefox browsers by changing their settings and inject ads into search results pages. Users are redirected to fraudulent domains where they are tricked...

GravityRAT Malware
November 2020

GravityRAT Malware

GravityRAT, a malware strain known for checking the CPU temperature of Windows computers to detect virtual machines or sandboxes, is now multi-platform spyware as it can now also be used to infect Android and macOS devices....

MalLocker.B Ransomware
October 2020

MalLocker.B Ransomware

Attention Android users, Microsoft has found a new ransomware that is targeting Android smartphones and has issued an alert about it. According to reports, this ransomware is called MalLocker.B and is spreading to Android phones via online forums and...

FORTINET VPN Security Attack
October 2020

FORTINET VPN Security Attack

In response to the spreading of Coronavirus across the world, many organizations deployed VPN solutions, including Fortigate VPN, to allow their employers to work from their homes. The configuration of the VPN solutions is important to keep organizat...

StrandHogg Malware Attack
October 2020

StrandHogg Malware Attack

Another day, another malware has become the talk of town. This time, you won’t even come to know of its existence within your Android smartphone. Experts are calling it the “StrandHogg”. According to them, this malware disguises itself in the f...