Exploit
- APPLICATIONS
Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software
Feb 13, 2025Ravie LakshmananNetwork Security / Vulnerability Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software…
Read More » - APPLICATIONS
Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability
Feb 12, 2025Ravie LakshmananContainer Security / Vulnerability Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the…
Read More » - APPLICATIONS
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
Feb 12, 2025Ravie LakshmananIT Security / Cybercrime The North Korea-linked threat actor known as Kimsuky has been observed using a…
Read More » - LAPTOP
YouTuber claims Marvel Rivals has an exploit that lets hackers take over your PC
A YouTuber has discovered a security flaw in Marvel Rivals, which could lead to hackers taking over your PC. Marvel…
Read More » - APPLICATIONS
Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks
Feb 11, 2025Ravie LakshmananMalware / Cyber Attack Threat actors have observed the increasingly common ClickFix technique to deliver a remote…
Read More » - APPLICATIONS
Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
Feb 10, 2025Ravie LakshmananMalware / Payment Security Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit…
Read More » - APPLICATIONS
Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet
Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant of the AISURU…
Read More » - APPLICATIONS
Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting
Jan 16, 2025Ravie LakshmananSpear Phishing / Threat Intelligence The Russian threat actor known as Star Blizzard has been linked to…
Read More » - APPLICATIONS
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
Jan 16, 2025Ravie LakshmananActive Directory / Vulnerability Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that’s designed…
Read More » - APPLICATIONS
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a…
Read More »