Microsoft gave direction on the most proficient method to relieve a DNS cache vulnerability detailed by security specialists from the University of California and Tsinghua University. Effectively abusing the said vulnerability could permit assailants to utilize changed DNS records to…
Latest posts - Page 126
XSS for PDFs: An all-new Injection technique that hurls greens for Security Analysts
Security specialists exhibited how a recently evolved XSS injection method empowered to lead an effective infusion assault or attack against a PDF which was rendered at the server-side during Black Hat Europe’s online meeting. An absence of sanitation of information…
Reported Bug in Microsoft Teams poses RCE risk
A security analyst has opened up to the world about a chain of vulnerabilities in Microsoft Teams they guarantee might have permitted an assailant to plant malignant code into systems just by fooling an objective into reviewing a malevolently made…
High severity NAT Slipstreaming vulnerabilities patched by Google’s Chrome 87
Generally speaking, Google’s Chrome 87 delivery fixed 33 vulnerabilities in security. Google has delivered patches for a few vulnerabilities that are quite critical in its Chrome program with the rollout of Google’s Chrome 87 for Windows, Mac and Linux clients.…
Interpol’s alert on COVID19 Vaccine Scams: Forged Sites and Cures
Interpol has cautioned of an expected expansion in cybercrime tricks abusing the news that the vaccine of Covid-19 has been endorsed for use in the UK. COVID related cybercrime expected to expand following Pfizer inoculation achievement… On December 2, the…
India’s leading Cyber Agency Hurling Against Evolving Cybersecurity Threats
The year 2020 saw quite the UPI-related cybersecurity threats and a few banks gave warnings, cautioning clients about the equivalent. As digital assaults flood in India particularly in the online payment modes and medical services areas, the Computer Emergency Response…
Vulnerable WordPress Websites under Open Attack
WordPress is one of the most mainstream Content Management Systems (CMSes) on the planet with more than 50,000 modules and subjects permitting experts and tenderfoots the same to make astonishing sites effortlessly. However, with incredible fame and openly accessible improvement…
Security Researcher earns $3,000 Bug Bounty for a CSRF Vulnerability in Glassdoor
A security expert has procured a bug bounty of $3,000 by accomplishing a webpage wide Cross-Site Request Forgery (CSRF) on employment site Glassdoor. Security researcher circumvents the security defences to alter jobseeker profiles, change manager records, and that’s just the…
SSRF’s Defences Side-passed Due to Vulnerable NPM Security Module
A vulnerability in Private-IP, a famous open-source NPM bundle for Node.js applications, enabled an entryway to hackers to play out different Server Side Request Forgery (SSRF) misuses, analysts have cautioned. Private-IP clients should be up to date to forestall their…
Snapchat’s ad Platform SSRF Vulnerability nicks $4,000 os Bug Bounty
The fleeting vulnerability disappears from social media because of the composed revelation A team of security analysts have acquired $4,000 in the wake of finding a Server-Side Request Forgery (SSRF) vulnerability in Snapchat. The group – Ben Sadeghipour, Sera Brocious,…