Critical Bug in Azure Hyper-V

Critical Bug in Azure Hyper-V Let Hackers Perform RCE & DOS Attacks

When it comes to security it seems that Microsoft will not lift its head from this term, as till now, it seems that 2021 is not the best year for Microsoft in terms of...
Node.js RCE Vulnerability Let Attackers Exploit & Crash The Apps

Node.js RCE Vulnerability Let Attackers Exploit & Crash The Apps

Recently, a security researcher Matthew Douglass have detected a use-after-free vulnerability in Node.js (an RCE Vulnerability) which is marked with a tag of high severity, and experts have tracked this as:- "Use-after-free on close http2...
Top 30 Most Targeted Vulnerabilities For The Last 2 Years – FBI

Top 30 Most Targeted Vulnerabilities For The Last 2 Years – FBI

Each and every year in the software and hardware that we use every day thousands of vulnerabilities are discovered by security researchers.  In the year 2019, the security experts detected 12174 vulnerabilities, and among them,...
Supply Chain Attack

What is a Supply Chain Attack? How Attackers Use that to Compromise Organization Security

You might be wondering how the supply chain attack works? First, let us tell you that this is one type of cyber-attack that targets the organization by focusing on its weaker link. This network...
Zimbra Flaw

New Flaw Let Hackers Take Over Zimbra Server Sending Malicious Email

Zimbra offers the most innovative messaging experience, connecting end-users to the information and activity in personal clouds. It is used by over 200,000 businesses and over a thousand government & financial institutions to exchange...
MITRE CWE 25

Top MITRE CWE 25 Most Dangerous Software Vulnerabilities – 2021

The American not-for-profit organization MITRE has recently published a list of CWE 25 of the most dangerous software vulnerabilities., The cybersecurity experts have compiled a list of the most dangerous and common software vulnerabilities...
Linux Kernel Bug Lets Hackers Gain Root Access on Most Modern Linux Distros

Linux Kernel Bug Lets Hackers Gain Root Access on Most Modern Linux Distros

The cybersecurity analysts at Qualys have discovered a new Linux kernel bug that lets any unprivileged threat actor gain root access on most modern Linux distros. By exploiting an LPE (Local Privilege Escalation) vulnerability a...
Wireshark 3.4.7

Wireshark 3.4.7 Released With Fix for Security Flaw & Support New Capture Files

Wireshark 3.4.7 was released with a fix for security vulnerabilities that leads to the DNP dissector crash and support for new capture files. Wireshark is known as the world’s most popular network protocol analyzer....
Kaseya Releases Patch

Kaseya Releases Patch and Restores VSA Servers Following Ransomware Attack

Kaseya released some emergency updates on July 11, and these updates also fix the vulnerabilities that are present in the Virtual System Administrator (VSA) software, which has affected 1500 companies around the world. However, this...
Threat Actors Actively Exploiting Solarwinds 0-Day Vulnerability Remotely

Threat Actors Actively Exploiting Solarwinds 0-Day Vulnerability Remotely

Recently, the American IT company SolarWinds has released fixes for a zero-day vulnerability in Serv-U file transfer technology, which is actively exploited by the threat actors. This 0-day vulnerability has so far been exploited by...