Eswar

Eswar is a Cyber security reporter with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is reporting data breach, Privacy and APT Threats.

Critical OpenVPN Flaw Let Attackers Escalate Privilege

OpenVPN has released their new version 2.6.10 in which there have been several bug fixes and improvements specifically to the…

4 days ago

Atlassian Patches Critical Bamboo Server & Other 24 Flaws

A critical Bamboo Data Center and Server vulnerability has been discovered with a critical vulnerability which has been given CVE-2024-1597…

1 week ago

Ivanti RCE flaw Let Attackers Execute Arbitrary Commands

Ivanti has been discovered with a new vulnerability on Ivanti Standalone Sentry that is associated with Remote code execution. The…

1 week ago

Microsoft Notifies DevOps Teams That Major Domain Change Is Coming

Microsoft is unifying its cloud domain for Microsoft 365 services under "cloud.microsoft" to streamline the user experience and administration, which…

1 week ago

900+ Websites Exposing 100M+ Accounts Including Plaintext Passwords

New research has revealed that more than 900 websites had a serious misconfiguration, which exposed a massive 125 million user…

1 week ago

Google Chrome To Roll Out Real-Time URL Protection For Malware & Phishing Attack

Google Chrome has been protecting users from malicious websites and files with Safe Browsing, which maintains a locally-stored list updated…

2 weeks ago

GhostRace Attack: Major CPU and Software Giants Flaw Let Attackers Steal Passwords

Race conditions arise when there is no insufficient synchronization with a shared resource allowing multiple threads to access it simultaneously.…

2 weeks ago

ChatGPT-Next-Web SSRF Flaw Let Attackers Gain Unauthorized Access

Apart from ChatGPT and Gemini AI which are the most popular Artificial Intelligence systems available to the public, there are…

2 weeks ago

Malware Families Adapting To COM Hijacking Technique For Persistence

COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding…

3 weeks ago

Android Malware-as-a-Service “Coper” Offering Advanced Features to Hackers

The Coper malware, a descendant of the Exobot malware family, was first distributed as a fake version of Bancolombia's ‘Personas'…

3 weeks ago