On Tuesday, Microsoft warned about a malicious campaign targeting SQL servers that uses a built-in PowerShell binary to persist on affected systems. The intrusions,…
attackers
Prynt Stealer: A new tool for attackers
Researchers have found a new infostealer on cybercrime forums having innumerable features. It can not only pilfer victims’ data but also execute financial thefts…
Vulnerability in VirusTotal allows attackers to take control of unpatched third-party antivirus
Security researchers have revealed a security issue that could enable attackers to exploit the VirusTotal platform for remote code execution (RCE) on unpatched third-party…
Attackers can take control of Aethon TUG Hospital Robots due to five flaws in JekyllBot
Aethon Tug hospital robots have been patched for at least five security flaws that might allow remote attackers to take control of the devices…
VMware vulnerability allows attackers to take control of the Cloud infrastructure
On Thursday, VMWare, a cloud computing and virtualisation technology firm, pushed an update to fix a critical vulnerability in its Cloud Director product. The…
Attackers can get out of Kubernetes containers because of a vulnerability in CRI-O engine
Attackers can exploit a previously unknown security vulnerability in the Kubernetes container engine CRI-O labelled cr8escape. The attacker can exploit the vulnerability to escape…
Attackers Crash Remote Servers with New Infinite Loop Bug in OpenSSL
The maintainers of OpenSSL have dispatched patches to resolve a high-severity security flaw in its software library that could lead to a denial-of-service (DoS)…
Cisco email security appliances under threat as Attackers can crash appliances
Cisco has released patches for three vulnerabilities that have been plaguing its products—one vulnerability rated high severity in its Email Security Appliance (ESA). The…
Samba-Critical Vulnerability Let Attackers Gain Remote Code Execution
A Virtual File System of Samba was found to be vulnerable to Remote Code Execution. Versions before 4.13.17 were vulnerable to this vulnerability. Samba…
Attackers can Take Over Computers through PowerPoint Files
Attackers use socially engineered emails with .ppam file attachments that hide malware that can rewrite Windows registry settings on targeted machines. The attacker used…