Chrome Security Update – 4 High-Severity Vulnerabilities Patched
Chrome Security Update - 4 High-Severity Vulnerabilities Patched. For Mac, Linux, and Windows, the Stable and Extended Stable channels have been upgraded to 114.0.5735.198/114.0.5735.198/199,...
Millions of GitHub Repositories Are Vulnerable To RepoJacking
An attack called RepoJacking may potentially affect millions of GitHub repositories.If abused, this vulnerability might result in code execution on the internal networks...
10 Best Vulnerability Scanner Tools For Penetration Testing – 2023
A Vulnerability Scanner Tool is one of the essential tools in IT departments Since vulnerabilities pop up every day and thus leaving a...
Hackers Exploit Android Vulnerability to Install Malware Without User Interaction Via Google Play
Security researchers from Trend Micro observed three malicious apps on Google Play that aims to compromise victims' devices and steal information from the SideWinder...
RCE Bug in Microsoft RDP Protocol Let Hackers Perform WannaCry Level Attack on 3...
A critical remote execution vulnerability in Microsoft remote desktop services enables RDP Protocol let attackers compromise the vulnerable system with WannaCry-level malware.Microsoft recently fixed...
New EMFI Attack Against Drones Leads to Complete Take Over
Based on the recent reports by IOActive, Drones, also called Unmanned Aerial Vehicles (UAVs), are vulnerable to code injection, which would result in gaining...
Lynis – Open Source Security Auditing & Pentesting Tool – 2023
Lynis is an open-source security auditing tool. Its main goal is to audit and harden Unix and Linux-based systems.
It scans the system by performing...
Gmail Flaw Let Hackers Bypass Security Checks
Gmail has the highest number of users, amounting to a massive 1.5 billion, which is 18.75% of the world population.Gmail is well-known for...
Splunk Flaw Let Attackers Escalate Privilege Using crafted web Request
Splunk is one of the most used SIEM (Security Incident and Event Management) tools worldwide.Splunk can collect logs of all the configured events...
Critical Google Cloud’s SQL Service Flaw Exposes Sensitive Data
Critical Google Cloud SQL Service could be exploited by attackers to access sensitive data and breach other cloud services.