ethicalhackersacademy
Hackers Scanning Unpatched Citrix Server to Exploit and Deploy Ransomware

Hackers Scanning Unpatched Citrix Server to Exploit and Deploy Ransomware

Researchers observed new activities from the unknown hackers who are scanning the unpatched Citrix server that affected by the recently patched critical...
Critical Vulnerabilities in Amazon Alexa Let Hackers Steal Personal Data & Remotely Install Skills

Critical Vulnerabilities in Amazon Alexa Let Hackers Steal Personal Data & Remotely Install Skills

Recently, a new vulnerability has been detected in Amazon Alexa, by the researchers of Checkpoint cybersecurity. This vulnerability is marked as "critical"...
15 Years Old Linux Bug Let Attackers Gain Admin Privileges

15 Years Old Linux Bug Let Attackers Gain Admin Privileges

Three bugs found in the mainline Linux kernel turned out to be about 15 years old. One of these bugs turned out...
SaltStack Vulnerability

Hackers Exploit SaltStack Vulnerability to Hack LineageOS, Ghost, DigiCert Servers

Hackers have exploited the recently patched vulnerability in the SaltStack configuration framework to hack the LineageOS, Ghost, DigiCert servers.
Critical Vulnerabilities Discovered in World’s Largest Android TVs Manufacturer

Critical Vulnerabilities Discovered in World’s Largest Android TVs Manufacturer

Television plays a vital role in our day to day life; that's why sticking with television has become one of the entertainment...
Cisco RCE Flaws

Cisco RCE Flaws Let Attackers Let Attackers Escalate Privileges

Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local...
Credits: Trend Micro

Exploiting an Exim Email Server Vulnerability Using EHLO Strings

In September end, the researcher discovered a critical vulnerability in the Exim email server that allows attackers to perform DoS attack and...
Cisco Webex Meetings Flaw Let Hackers to Gain Access to Sensitive Information on Vulnerable System

Cisco Webex Meetings Flaw Let Hackers to Gain Access to Sensitive Information on Vulnerable...

Recently, a new vulnerability was discovered by the security experts at Cisco that allows hackers to obtain sensitive information on a vulnerable...
VLC Player Vulnerability

Vulnerability with VLC Player 3.0.11 Let Attackers Execute Code Remotely

VLC is a free and open-source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs,...
Twitter Hacked – Hackers Exploited Twitter Vulnerability To Match Usernames to Phone Number using Fake Accounts

Twitter Hacked – Hackers Exploited Twitter Vulnerability To Match Usernames to Phone Number using...

State-sponsored hackers exploited Twitter API vulnerability using a larger number of fake accounts to match the usernames to the phone numbers.
ethicalhackersacademy

Recent News