Network Security

Cisco IMC Command Injection Vulnerability Under Active Attack

An attacker with read-only or higher privileges on a Cisco Integrated Management Controller (IMC) can exploit a command injection vulnerability…

6 days ago

Multiple Juniper Networks Flaw Let Attackers Delete Files

The Juniper networks-owned Junos OS has been discovered to have multiple vulnerabilities associated with Denial of Service (DoS), Path Traversal,…

1 week ago

Multiple Fortinet Vulnerabilities Let Attackers Execute Arbitrary Code

Multiple vulnerabilities have been discovered in FortiOS and FortiProxy that were related to administrator cookie leakage, arbitrary command execution and…

2 weeks ago

Hackers Using Malware-Driven Scanning Attacks To Pinpoint Vulnerabilities

Attackers are now using malware-infected devices to scan target networks instead of directly scanning them. This approach helps them to…

2 weeks ago

Apache HTTP Server Flaw Let Attackers Inject Malicious Headers & HTTP/2 DoS

Apache released updates to address several vulnerabilities impacting the Apache HTTP server that let attackers launch HTTP/2 DoS attacks and insert…

3 weeks ago

D-Link NAS Command Injection Flaw : 92,000 Devices Affected

A new command injection vulnerability and a backdoor account have been discovered in D-Link Network Attached Storage devices, which affects…

3 weeks ago

Wireshark 4.2.4 Released : What’s New!

Wireshark remains the go-to choice for both professionals and enthusiasts due to its unmatched capabilities in packet capturing and analysis.…

4 weeks ago

Critical OpenVPN Flaw Let Attackers Escalate Privilege

OpenVPN has released their new version 2.6.10 in which there have been several bug fixes and improvements specifically to the…

1 month ago

Hackers Exploit DHCP To Escalate Privileges In Windows Domains

Researchers at Akamai have unveiled a new technique that could potentially put millions of Windows domains at risk. This technique…

1 month ago

Choosing The Right Proxy Server And Port : A Practical Guide

Imagine a situation where you are engaged in web scraping, streaming, or any virtual exploits, and your proxy selection is…

1 month ago