Google’s Project Zero team has found and reported 18 zero day vulnerability in Samsung’s Exynos chipsets. This chipsets are in-use various devices such as…
vulnerabilities
Microsoft fixes three actively exploited Windows vulnerabilities.
Three zero-day vulnerabilities are included in Microsoft’s Patch Tuesday collection for February 2023. Not exactly the Valentine’s Day that we had in mind. If…
Vulnerabilities in Sunlogin- Hackers Backdoored Windows
A new hacking campaign has emerged that exploits the vulnerabilities in Sunlogin. It is to deploy the Sliver post-exploitation toolkit and launch Windows Bring…
KeePass vulnerabilities permit sneaky password stealing.
The KeePass development team is contesting what a recently discovered weakness that enables attackers to export the entire database in plain text covertly is.…
Checkmk IT infrastructure monitoring software has Vulnerabilities
The Checkmk IT Infrastructure monitoring software has vulnerabilities that have been publicly revealed and could be exploited by a remote, unauthenticated attacker to completely…
Jira Align vulnerabilities allow getting super admin rights
The researcher says that it was theoretically conceivable to move laterally or upward beyond the instance. Jira Align vulnerabilities allow getting super admin rights.…
Widespread website hijack danger is caused by hidden DNS resolver vulnerabilities
WordPress installations at risk from a cache poisoning attack due to faked password resets. Security researchers caution that hidden DNS resolvers can be used…
Aircraft WiFi Devices Found to Have Vulnerabilities, Exposing Passengers’ Data
In wireless LAN equipment that is supposedly used to provide internet connectivity in flights, two serious aircraft wifi devices vulnerabilities were discovered. The Flexlan…
There have been reported new vulnerabilities in Baxter’s internet-connected infusion pumps
Baxter’s internet-connected infusion pumps utilized in clinical settings by healthcare providers to administer medication to patients, have been found to contain a number of…
MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations
The Microsoft Threat Intelligence Center (MSTIC) and Microsoft 365 Defender Research Team have recently discovered Iran-based threat actor MERCURY using SysAid applications’ exploits of…