-0.2 C
Munich
Friday, April 26, 2024
- Advertisement -

TAG

Vulnerability

13 Known Exploited Vulnerabilities Added to CISA Catalog

CISA has added 13 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed...

CISCO Recently Patched Critical Vulnerabilities

Cisco has patched a pair of vulnerabilities in its telco-focused Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS software, including a critical flaw that...

You Need to Patch Windows Remote Desktop Vulnerability Now

CyberArk researched discovered a Windows Remote Desktop (RDP) vulnerability tracked as CVE-2022-21893, which you need to patch now! Vulnerability Description This vulnerability enables any standard unprivileged...

Microsoft Defender Vulnerability Remains Unpatched

A vulnerability has been discovered that could make it easy for hackers to circumvent Microsoft Defender protective function. Microsoft Defender allows hackers to bypass malware...

New Safari Vulnerability Can Leak Recent Browsing History and Some of your Google Account Information

A new Safari vulnerability disclosed by FingerprintJS, can leak recent browsing history and some information of your logged-in Google account. The bug was introduced in...

What are Dependency Confusion Attacks?

A dependency confusion attack (or supply chain attack) occurs when a software installer script is tricked into pulling malicious code file from a public...

A 19 Year Old Hacker Received $4,500 Bug Bounty for an Easy-To-Exploit Vulnerability

A high impact privacy bug was found in Facebook's Android application by a young bug bounty hunter. The 19 year old hacker received a...

Vulnerability vs Exploit, Do You Know The Difference?

We continuously read about cyber-attacks, hacks and data breaches. All those news and articles keep on referring to words like vulnerability and exploits. But...

Penetration Testing: Create a DNS Zone Transfer Lab

While performing penetration testing against your target one of the things you will look for is if you can perform a DNS Zone transfer. What...

A List of Tools to Help you Detect the Log4j Vulnerability

How can you detect the Log4j zero day vulnerability (known as Log4shell)? Here’s a list of FREE Log4j vulnerability scanner tools. Amazon Inspector and AWS The Amazon...

Latest news

- Advertisement -