2.2 C
Paris
Sunday, January 29, 2023

Exploit

CSRF Vulnerability Discovered in Plesk API

Plesk is a very popular administration tool for web hosting and data center providers. Users usually use its web interface to administer their websites...

Security Professionals, BEWARE of Fake PoCs

Proof-of-concept (PoC) of exploits for known vulnerabilities are widely shared in the security community. They help security analysts to learn from each other and...

Penetration Testing vs Vulnerability Scanning

Penetration testing vs vulnerability scanning, is there a difference? Should you choose between them or both? There is a lot of misunderstanding and confusion between...

$320 Million Stolen from Crypto Trading Platform

By exploiting a vulnerability in the software of a crypto trading platform, hackers stole 320 million in cryptocurrencies. Wormhole Portal is a web-based application that...

Vulnerability vs Exploit, Do You Know The Difference?

We continuously read about cyber-attacks, hacks and data breaches. All those news and articles keep on referring to words like vulnerability and exploits. But...

Massive Internet Scans and Log4j Exploit Attempts

It is clear that the Log4j vulnerability is one of the most serious vulnerabilities in recent years. Many organizations have noticed a surge in...

Researcher Publishes Exploit Affecting All Windows Versions

Researcher Publishes Exploit Affecting All Windows Versions

Warning to Apple Users! Possible Device Hack by Just Sending Email

TWO CRITICAL FLAWS According to cybersecurity researchers at ZecOps, bugs were found in the Apple mail app which can allow RCE (Remote Code Execution), due...

Zoom Usernames and Passwords Compromised and Listed on Dark Web Forum

The Coronavirus crisis has forced many organizations to embrace "work from home". Zoom platform has become increasingly famous due to this, but also for...

Latest