EHA
Home Search

exploit vulnerabilities - search results

If you're not happy with the results, please do another search
Microsoft Security Update may

Alert! Microsoft Fixes 60 Vulnerabilities With 2 Actively Exploited Zero-Days

In its May 2024 Patch Tuesday release, Microsoft addressed 60 vulnerabilities, including 2 zero-day vulnerabilities actively exploited in the wild. The updates cover a range...
GPT-4 Is Capable Of Exploiting 87% Of One-Day Vulnerabilities

GPT-4 Is Capable Of Exploiting 87% Of One-Day Vulnerabilities

Large language models (LLMs) have achieved superhuman performance on many benchmarks, leading to a surge of interest in LLM agents capable of taking action,...
Kubernetes Clusters Under Attack: Critical OpenMetadata Vulnerabilities Exploited

Kubernetes Clusters Under Attack: Critical OpenMetadata Vulnerabilities Exploited

Microsoft Security recently revealed a sophisticated cyber-attack campaign that targets Kubernetes clusters by exploiting newly discovered vulnerabilities in the OpenMetadata platform. The attackers have...
Magnet Goblin Hackers Exploiting 1-day Vulnerabilities To Attack Linux Servers

Magnet Goblin Hackers Exploiting 1-day Vulnerabilities To Attack Linux Servers

Threat actors often target Linux servers due to their widespread use in critical infrastructure, web hosting, and cloud environments.  The open-source nature of the Linux...
Sea Turtle APT Group Exploiting Known Vulnerabilities to Attack IT-service Providers

Sea Turtle APT Group Exploiting Known Vulnerabilities to Attack IT-service Providers

To obtain access to a variety of clients' systems and data in a single attack, hackers frequently target IT service providers.  Their strategy lets them...
Top 10 Vulnerabilities of 2023

Top 10 Vulnerabilities That Were Exploited the Most In 2023

Several vulnerabilities have been identified and exploited by threat actors in the wild this year for several malicious purposes, such as Ransomware, cyber espionage,...
New Metasploit Modules

8 New Metasploit Exploit Modules Released Targeting Critical Vulnerabilities

Metasploit is an open-source penetration testing framework created by Rapid7 that enables security professionals to simulate attacks against computer systems, networks, and applications. It includes...
CISA to Flag Vulnerabilities & Misconfigurations Exploited in Ransomware Attacks

CISA to Flag Vulnerabilities & Misconfigurations Exploited in Ransomware Attacks

Ransomware attacks have grown to be a serious concern for businesses of all sizes, with the potential to seriously harm the operations, finances, and reputation...
Top 20 Most Exploited Vulnerabilities – Hackers are Particularly Drawn to Microsoft’s Products

Top 20 Most Exploited Vulnerabilities: Microsoft Products Draw Hackers

Finding and patching the open vulnerabilities in today's threat landscape is one of the utmost priorities for security researchers and analysts. Identifying weaponized high-risk CVEs...
Hackers Exploit Pre-Authentication RCE Vulnerabilities in Adobe ColdFusion

Hackers Exploit Pre-Authentication RCE Vulnerabilities in Adobe ColdFusion

Adobe ColdFusion is a Java-based, commercial web app development platform using CFML for server-side programming. ColdFusion is primarily known for its tag-based approach, which is...

Managed WAF

Website

Latest News