A warning was chosen preferable to a patch and added to the Python documentation. Security experts estimate that a 15-year-old path traversal vulnerability in…
path traversal
Attacks Using Path Traversal Are Susceptible To Millions Of Arris Routers
The MIT-licensed muhttpd web server has security flaws, according to a report by security expert Derek Abdine. The Arris firmware, which is featured in…
DDoS Attack – Russia Sets New Record
In a report published on January 24, 2023, Russian telecommunications company Rostelecom revealed 21.5 million critical web attacks. These attacks aimed at roughly 600…
Hackers Using Zimbra Collaboration Suite’s Unpatched RCE Flaw
There is currently no patch available to fix a serious remote code execution vulnerability(RCE Flaw) in the enterprise collaboration software and email platform provided…
GoTestWAF Expands API Attack Testing With Support For OpenAPI
Attendees at Black Hat USA have learned that the popular open-source hacking tool GoTestWAF has developed into the first utility of its kind to…
Windows And UnRAR Weaknesses Are Being Actively Used In The Field, According To CISA
Based on the evidence of active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its list of…
Business Networks Were Vulnerable To Misuse Because Of Zyxel Firewall Flaws
The severity of the code execution bug was reduced by the prior patch’s “high uptake.” Following the identification of two security flaws that exposed…
New Sysrv Botnet Variant Hijacking Windows and Linux with Crypto Miners
Microsoft is warning of a new variant of the srv botnet that’s exploiting multiple security flaws in web applications and databases to install coin…
New botnet hacking Windows and Linux using crypto miners
Microsoft has issued a warning about a new version of the srv botnet, which is exploiting several vulnerabilities in web applications and databases. The…
The top exploited vulnerabilities in 2021 have been revealed by cybersecurity firms
Cybersecurity authorities around the world have released a list of the top 15 vulnerabilities regularly exploited by threat actors in 2021, in collaboration with…