Google released a patch for 5 vulnerabilities found in Chrome. One of the vulnerabilities was being exploited in the wild, and it was altogether…
Vulnerabilities
MANGA Exploiting TP-Link Vulnerability
The MANGA(aka Dark Mirai) botnet operators’ exploitation of a vulnerability in the TP-Link TL-WR4840N EU V5 has come to light. The vulnerability allows hackers…
Vulnerability in Mozilla’s NSS Crypto Library impacts software
Mozilla released patches for vulnerabilities in its cross-platform Network Security Services (NSS) cryptographic library. The vulnerability can be exploited for crashing an application or…
VMware releases patches for two flaws
VMware released updates to plug two loopholes in vCenter Server and Cloud Foundation that can be exploited to obtain sensitive information. The acute vulnerability…
Ethical Hackers prevent $27bn cybercrime
A report by California crowdsourced cybersecurity platform Bugcrowd states that ethical hackers have warded off $27bn worth of cybercrime during the COVID-19 pandemic. The…
HTML smuggling targets Banking industry
Microsoft reported HTML smuggling, which spread via email, had been extensively targeting banking organizations. Microsoft described the attack that surfaced in the early half…
Zoom vulnerability by Positive Technologies
The U.S-sanctioned Positive Technologies has underscored three vulnerabilities in the zoom, Zoom vulnerability that can be used for crashing or hijacking on-prem parts of…
MacOS Vulnerability Target Hong Kong
Google researchers have detected a zero-day MacOs vulnerability in operating system. The hackers have targeted Hong Kong websites of a media outlet and pro-democracy…
GlobalProtect VPN: Zero Day Disclosure
Palo Alto’s network GlobalProtect VPN has a new zero-day vulnerability reported by researchers. The vulnerability allows the hacker to use an unauthenticated network to…
Busybox Linux utility Vulnerabilities uncovered
Cybersecurity researchers discovered 14 critical vulnerabilities in the BusyBox Linux utility. The hackers can exploit the vulnerability for carrying out a denial-of-service (DoS) attack,…