Zyxel has rolled out patches for four security flaws plaguing its firewall, AP Controller, and AP products. The flaw can be exploited to carry…
Vulnerability
Google’s OAuth client library for Java had a major flaw
Last month Google patched a severe flaw in its OAuth client library for Java; the actors can exploit the flaw by using a compromised…
Vmware Horizon servers continue to be exploited through log4j vulnerability
Attackers continue to target VMware Horizon servers, which many organizations use to securely access enterprise apps for remote workers. Attackers are exploiting the critical…
Botnet Malware jeopardises over 2,00,000 Mikro Tik routers
Mikro Tik’s vulnerable routers have been used in one of the largest botnet-as-a-service cybercrime, according to cybersecurity researchers. Avast published a new piece of…
Dell BIOS bugs impact millions of Inspiron, Vostro, XPS, Alienware systems.
Five new vulnerabilities have been found in Dell BIOS; if the vulnerabilities are successfully exploited, the systems can have codes executed remotely. The Dell…
Log4j news -Log4j patch releases by Apache
Log4j news – On 28th December 2021, another vulnerability affecting the Log4j logging library was discovered. The vulnerability is labelled CVE-2021-44832. The vulnerability CVE-2021-44832…
Log4j vulnerability, risks emanating from it
Already existing codes and codes created from scratch Earlier, an author of software wrote each code from scratch for the software, but things have…
Facebook extends its bug bounty program
Meta Platforms, formerly known as Facebook, has announced that it’s scaling up its bug bounty program. The bug bounty program will start rewarding genuine…
P2P ThroughTek Vulnerability Could Give Camera Feed Access; CISA Warns
CISA has newly issued an ICS (Industrial Control Systems) advisory for a ThroughTek device P2P vulnerability that could allow malicious entities unauthorized access to…
Facebook Messenger Bug Could Compromise Facebook User Private Data
Details of the Facebook Messenger vulnerability were discussed in a proof-of-concept where it was observed that a user’s Facebook account could be hacked using…