EHA
Hackers Exploiting SAP Vulnerabilities

Hackers Targeting Mission-critical SAP Applications Exploiting known Security Vulnerabilities

Active cyberattacks on known vulnerabilities in SAP systems could lead to full control of unsecured SAP applications, according to a report issued by SAP and cyber threat research company Onapsis. The security flaws with...
Cisco RCE Flaws

Cisco RCE Flaws Let Attackers Let Attackers Escalate Privileges

Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. Cisco has released software...
Zero-Click Flaw with Apple Mail

Zero-Click Flaw with Apple Mail Can be Triggered by Sending Two Zip Files

Mikko Kenttala, founder and CEO of SensorFu found a zero-click vulnerability in Apple Mail, which allowed to add or modify any arbitrary file inside Mail’s sandbox environment. This could lead to many bad things including...

Microsoft Build a New Threat & Vulnerability Management Features to Prevent Advanced Cyber Attacks

Microsoft Defender ATP is an add-on with Windows Defender Antivirus aimed to combat cyber attacks and to secure your environment. The threat & Vulnerability Management (TVM) is the latest inclusion in Microsoft Defender ATP. At...
Virtual Learning Software flaw

Critical Bugs in Virtual Learning Software May be Used to Hack into Student PCs

The McAfee Labs Advanced Threat Research team recently investigated software installed on computers used in K-12 school districts. Netop Vision Pro produced by Netop, the company behind a popular software tool designed to let teachers...

Burpsuite Professional 2.1.04 Released with Fixes of Bugs

Portswigger released a new Burpsuit Professional 2.1.04 with the few minor enhancements and bug fixes. Burpsuite Scanner is a graphical security tool for testing Web application security. The tool is composed in Java and created...

A Vulnerability in Signal App Let Attacker Force a Call to be Answered At...

Google project zero Team researcher discovered a vulnerability in Signal Messanger App lets a malicious attacker force an incoming call to be answered at the receiver end without any user interaction. The bug...

7 Year-old RCE Vulnerability in macOS Terminal Emulator iTerm2 Let Hackers Execute Remote Command...

Mozilla Researchers discovered a critical vulnerability in macOS Terminal Emulator iTerm2 allows attackers to connect with the SSH server to execute a command on the user’s computer. iTerm2 terminal emulator is a replacement for macOS terminal...

High Severity Vulnerability Found in Intel Software Let Hackers Perform Escalation of Privilege, DoS...

Intel released a security update for multiple vulnerabilities that affected Intel software products, including Intel Smart Connect Technology, Active System Console and system firmware for Intel NUC. Intel patched 4 vulnerabilities that include 2 "Medium"...

Exploiting an Exim Email Server Vulnerability Using EHLO Strings

In September end, the researcher discovered a critical vulnerability in the Exim email server that allows attackers to perform DoS attack and even remote code execution to take complete control of the vulnerable server. The...

Managed WAF

Website

Latest News