Articles that are tagged

Vulnerabilities

Recent News

VULNERABILITIES

Proxy server vulnerability messing up with Exchange Server config

19 days ago

The system administrators thought ProxyShell vulnerability isn't a good reason to apply the July 2020... Read more

VULNERABILITIES

Vulnerabilities exploited to Hack Linux Systems

23 days ago

Linux-based frameworks are presented to the web directly—attackers can, hence, undoubtedly target them to introduce... Read more

VULNERABILITIES

Web Shells and Ransomware transmitted exploiting ProxyShell Vulnerabilities

26 days ago

The Cybersecurity and Infrastructure Security Agency (CISA) has recently warned that various attackers use three... Read more

VULNERABILITIES

'Bad Example' by Accenture for lack of transparency during ransomware attacks

31 days ago

When ransomware and cyber-attacks are at an all-time high, solution providers believe that high profile... Read more

VULNERABILITIES

Terrorist watchlist with nearly 1.9M Records exposed

4 weeks ago

Volodymyr Diachenko, aka ‘Bob,’ the head of security research at Comparitech, revealed the discovery of... Read more

VULNERABILITIES

Should We Bow to USBSamurai?

5 weeks ago

Recently penetration testers working on vulnerabilities faced by industrial level environments on USB implants got... Read more

VULNERABILITIES

Echo dots store a wealth of data, even after resetting them

5 weeks ago

Like most IoT devices these days, Amazon's echo dot gives users a way to factory... Read more

VULNERABILITIES

Hidden Linux RPM bug discovered after decades

11 weeks ago

Red Hat has used RPM for software package distribution for decades with no prior known... Read more

VULNERABILITIES

Bounty worth Rs 22 Lakh for a bug in Azure cloud systems

11 weeks ago

Bug bounty hunters are cybersecurity professionals or researchers who explore the web and find and... Read more