Chrome zero-day

Chrome zero-day – Update Now to Protect from Wildly Exploited Vulnerability

Kaspersky technologies noticed a wave of ‘highly targeted attacks’ against multiple companies during April 2021. As a result of the analysis, all these attacks exploited a chain of Google Chrome and Microsoft Windows zero-day...
Microsoft Office flaw

Critical Microsoft Office Products Flaw Let Attackers to Weaponize Word and Excel Docs

Researchers from Check Point revealed security vulnerabilities in the Microsoft Office suite that cloud allows attackers to craft weaponized Word and Excel documents. Analysis of Vulnerabilities in Microsoft Office Component For the analysis, the experts used...
Cisco High-severity Flaws

Cisco High-severity Flaws in Webex, SD-WAN, ASR 5000 Software Let attacker Execute Arbitrary Code

The giant IT Cisco has disclosed multiple vulnerabilities in its products of Webex, SD-WAN, and ASR 5000 software which could let the attackers execute arbitrary code and for the good part, Cisco has released...
Jetpack Security Flaw

Jetpack Plugin With 5 Million Active Installation Suffered A Security Flaw

Jetpack is a plugin suite that combines essential WordPress features into one large plugin. It provides free security, performance, marketing, and website management features. With Jetpack, you can: Get a safer, stronger site via secure...
Attackers Abuse Signed PDF Files

Attackers can Abuse Signed PDF Files to Change Amount and Bank Account Number

A security issue in the certification signatures of PDF documents has been discovered by researchers at Ruhr-University Bochum. The Portable Document Format (PDF) is the defacto standard for document exchange. PDF signatures are a well-established...
VAPT TOOLS

Top 10 Vulnerability Assessment and Penetration Testing (VAPT) Tools

VAPT Tools are playing the most important part in penetration testing, Here we have listed to top 10 most used VAPT tools for both free and commercial purpose. At first, if you hear Vulnerability Assessment...
Wormable IIS flaw

Working PoC Published for Wormable Windows IIS Server Vulnerability tracked as CVE-2021-31166

An analysis and working proof-of-concept were found for a wormable Windows IIS server vulnerability which could have potential code exploitation. Microsoft has tracked this in a patch stated CVE-2021-31166. What can this Exploitation do? The flaw...
Apple AirTag

Apple AirTag has been Hacked by a Researcher Just over a Week After Launch

Apple’s latest gadget, the AirTag, has been hacked for the first time within two weeks of its launch in April 2021. A security researcher has been able to hack the accessory by modifying its...
Adobe zero-day Vulnerability

Adobe Zero-day Vulnerability Reader for Windows has been Exploited in the Wild

Adobe has notified its customers of a critical zero-day vulnerability actively exploited in the wild that affects its ubiquitous Adobe Acrobat PDF reader software. According to Adobe, the zero-day vulnerability, tracked as CVE-2021-28550, “has been...
Security Flaws Russian Hackers

Top 12 Security Flaws Exploited by Russian Hackers to Target Organisations Globally

A joint advisory by the US Department for Homeland Security's Cybersecurity Infrastructure Security Agency (CISA), FBI, and the National Security Agency (NSA), as well as the UK National Cyber Security Centre warned organizations about...