Execute Malware iPhone

Researchers Find a New Way to Execute Malware Even While The iPhone is Switched...

The iPhone does not completely shut down when you turn it off because it is not completely powered down. Researchers have devised a new kind of malware that can run even when the phone's...
SSLVPN SMA1000 Bugs

SonicWall Strongly Urges Organizations to Patch SSLVPN SMA1000 Bugs

SonicWall issued a security notice urging customers to immediately patch several vulnerabilities that are considered high-risk affecting its Secure Mobile Access (SMA) 1000 Series line of products. This can allow attackers to bypass authorization and,...
10-Year-Old Flaws With Avast and AVG

10-Year-Old Flaws With Avast and AVG Antivirus Let Attacker to Escalate Privileges

SentinelOne's Kasif Dekel has discovered and publicly disclosed two new high-severity security vulnerabilities in Avast and AVG antivirus products. The two vulnerabilities are tracked as CVE-2022-26522 and CVE-2022-26523 affecting a legitimate driver that is used...
F5 Critical Bug

F5 Warns of a Critical Bug that Allows an Unauthenticated Attacker to Gain Complete...

On Wednesday, Cloud security and ADN provider F5 released patches that contained 43 bugs affecting the company's many products. Among these bugs, there is a critical one that could lead an unauthenticated attacker to...
TLStorm 2.0

Critical TLStorm 2.0 Bugs Let Attackers to Gain Remote Access to Enterprise Networks

In multiple models of both Aruba and Avaya switches, Armis has detected five vulnerabilities relating to the implementation of TLS communications.  Using these vulnerabilities, there is a possibility that remote access could be gained to...
Unpatched DNS Bug

Unpatched DNS Bug Let Attackers to Perform DNS Poisoning Attacks

An unpatched security vulnerability was found in the domain name system (DNS) component of a popular C standard library in many well-known IoT products. Researchers from Nozomi Networks Labs said, “The flaw was caused by...
Azure Database for PostgreSQL Let Attacker to Bypass Authentication and Gain Access

Azure Database for PostgreSQL Let Attacker to Bypass Authentication and Gain Access

The cloud cybersecurity firm, Wiz discovered a chain of critical vulnerabilities in the widely used Azure Database for PostgreSQL Flexible Server. This could result in unauthorized cross-account database access in a region. The vulnerabilities were...
Remote Code Execution in VMware

Hackers Exploit Critical Remote Code Execution in VMware to Install Malware

The cybersecurity researchers at Morphisec have discovered recently a critical RCE vulnerability in VMware Workspace ONE Access that is being actively exploited by advanced hackers, and this critical flaw has been tracked as "CVE-2022-22954." In...
QNAP UPnP Port

QNAP Urged customers to disable UPnP Port on their Routers

In order to forward the ports that are in use from one device to another device on a network Universal Plug and Play (UPnP) Port forwarding was introduced. This feature automatically forwards the ports...
Snort Flaw

Snort Flaw Let Attacker to Trigger DoS Condition & Pass Malicious Traffic

An intrusion detection system called Snort has been found to have a security vulnerability, reported by the cyber security analysts at Team82. And this could trigger the occurrence of a denial of service (DoS)...