CISA Published a New Tool to Help Organizations Protect Against Threats & Assessing Vulnerability

CISA Published a New Tool to Help Organizations Protect Against Threats & Assessing Vulnerability

The researchers of the Cybersecurity and Infrastructure Security Agency (CISA) have published an Insider Risk Mitigation Self-Assessment Tool to help the organizations protect themself against cyber threats.  This tool helps the public as well as...
Microsoft Azure Services Bug Let Hackers Gain Root Access on Cloud When Users Setup on Linux VM

Microsoft Azure Services Bug Let Hackers Gain Root Access on Cloud When Users Setup...

The security research team of Wiz has detected a series of dangerous vulnerabilities in Microsoft Azure Services that enable the threat actors to gain root access on Linux virtual machines when set up in...
Fortinet VPN

Hackers Leak 500,000 Fortinet VPN Credentials that Scraped From Exploitable Devices

On 8th September 2021, Fortinet has come to know that a malicious actor has recently disclosed SSL-VPN access, and this information has come from the FortiGate SLL-VPN device. These types of credentials have been...
OWASP TOP 10 2021

OWASP Top 10 2021 Released – What’s New!!

After 4 Years, OWASP TOP 10 vulnerabilities 2021 was released with the newly added vulnerabilities in the list and made changes in the previous positions of the OWASP TOP 10 2017 vulnerabilities list. The new list of...
Multiple Security Vulnerabilities With NETGEAR Let Attackers Gain Full Control of Device – PoC Released

Multiple Security Vulnerabilities With NETGEAR Let Attackers Gain Full Control of Device – PoC...

Netgear has recently fixed over a dozen of its smart switches that are generally used on corporate networks, and Netgear has released respective firmware updates to fix them. In these security updates Netgear has addressed...
BRAKTOOTH – 16 New Bluetooth Bugs Let Hackers Execute Arbitrary Code & DDoS on Millions of Devices

BRAKTOOTH – 16 New Bluetooth Bugs Let Hackers Execute Arbitrary Code & DDoS on...

Bluetooth Classic protocol is prevalent for laptop and audio devices. This is mainly discovered for several critical vulnerabilities.  As per the report, BrakTooth is a family of a new security vulnerability. These are reported...
WhatsApp Image Filter Bug

WhatsApp Image Filter Bug Let Hackers Steal Sensitive Information

Till September 2021, WhatsApp has no end in popularity, and it is one of the most popular global messenger app this worldwide. As per the report, there are two billion monthly active users for...
WordPress Plug-in Vulnerability Let Hackers Access Sensitive information Over 1 Million Websites

WordPress Plug-in Vulnerability Let Hackers Access Sensitive information Over 1 Million Websites

The Threat Intelligence team of Wordfence security firm disclosed two vulnerabilities in the Gutenberg Template Library & Redux Framework plugin on August 3, 2021, and it's installed on over 1 million WordPress sites. However, after...
Microsoft Exchange Server Flaw Let Remote Attackers Access Sensitive Information

Microsoft Exchange Server Flaw Let Remote Attackers Access Sensitive Information

ProxyToken, a serious security vulnerability has been detected in the Microsoft Exchange Server by the security analysts. ProxyToken vulnerability could enable unauthenticated threat actors to access and steal emails from a victim mailbox. The threat...
New Vulnerability Allow Hackers to Bypass PIN Codes on Contactless Cards From Mastercard & Maestro

New Vulnerability Allow Hackers to Bypass PIN Codes on Contactless Cards From Mastercard &...

The cybersecurity researchers at the Swiss Higher Technical School of Zurich have recently identified a critical vulnerability that allows any threat actor to bypass PIN codes on contactless cards from Mastercard and Maestro. The most...