Hackers Scanning Unpatched Citrix Server to Exploit and Deploy Ransomware
Researchers observed new activities from the unknown hackers who are scanning the unpatched Citrix server that affected by the recently patched critical...
Critical Vulnerabilities in Amazon Alexa Let Hackers Steal Personal Data & Remotely Install Skills
Recently, a new vulnerability has been detected in Amazon Alexa, by the researchers of Checkpoint cybersecurity. This vulnerability is marked as "critical"...
15 Years Old Linux Bug Let Attackers Gain Admin Privileges
Three bugs found in the mainline Linux kernel turned out to be about 15 years old. One of these bugs turned out...
Hackers Exploit SaltStack Vulnerability to Hack LineageOS, Ghost, DigiCert Servers
Hackers have exploited the recently patched vulnerability in the SaltStack configuration framework to hack the LineageOS, Ghost, DigiCert servers.
Critical Vulnerabilities Discovered in World’s Largest Android TVs Manufacturer
Television plays a vital role in our day to day life; that's why sticking with television has become one of the entertainment...
Cisco RCE Flaws Let Attackers Let Attackers Escalate Privileges
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local...
Exploiting an Exim Email Server Vulnerability Using EHLO Strings
In September end, the researcher discovered a critical vulnerability in the Exim email server that allows attackers to perform DoS attack and...
Cisco Webex Meetings Flaw Let Hackers to Gain Access to Sensitive Information on Vulnerable...
Recently, a new vulnerability was discovered by the security experts at Cisco that allows hackers to obtain sensitive information on a vulnerable...
Vulnerability with VLC Player 3.0.11 Let Attackers Execute Code Remotely
VLC is a free and open-source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs,...
Twitter Hacked – Hackers Exploited Twitter Vulnerability To Match Usernames to Phone Number using...
State-sponsored hackers exploited Twitter API vulnerability using a larger number of fake accounts to match the usernames to the phone numbers.