A critical SQL injection vulnerability, identified as CVE-2024-45387, has been discovered in Apache Traffic Control, a widely used open-source platform for managing large-scale content delivery networks (CDNs). This vulnerability affects
All posts by admin
Apache HugeGraph-Server Vulnerability Lets Attackers Bypass Authentication
A new security vulnerability, CVE-2024-43441, has been identified in Apache HugeGraph-Server, a widely used open-source graph database system. This flaw, classified as an Authentication Bypass by Assumed-Immutable Data vulnerability, affects
OilRig Hackers Exploiting Windows Kernel 0-day to Attack Organizations
The Iranian state-sponsored hacking group OilRig, also known as APT34, has intensified its cyber espionage activities, targeting critical infrastructure and government entities in the United Arab Emirates and the broader
Trump 2.0 Portends Big Shift in Cybersecurity Policies
DNSSEC Denial-of-Service Attacks Show Technology’s Fragility
Two New Malicious PyPI Packages Attacking Users to Steal Login Details
Two malicious Python Package Index (PyPI) packages: Zebo-0.1.0 and Cometlogger-0.1, have been identified, posing a significant threat to user security. These packages, uploaded in November 2024, exploit unsuspecting developers and users, aiming
New G-Door Vulnerability Lets Hackers Bypass Microsoft 365 Security With Google Docs
A newly discovered vulnerability, dubbed “G-Door,” allows malicious actors to circumvent Microsoft 365 security measures by exploiting unmanaged Google Docs accounts. This security flaw poses a significant threat to organizations
Threat Actors Exploiting Microsoft Office Vulnerability to Execute Malicious Code
A sophisticated cyber-espionage group known as Cloud Atlas has been observed leveraging a critical Microsoft Office vulnerability to launch targeted attacks against organizations in Eastern Europe and Central Asia. According
WPA3 Network Password Bypassed via MITM Attack & Social Engineering
Researchers have successfully bypassed the Wi-Fi Protected Access 3 (WPA3) protocol to obtain network passwords using a combination of Man-in-the-Middle attacks and social engineering techniques. The research, conducted by Kyle
Weekly Cybersecurity Newsletter: Cyber Attack News, Vulnerabilities & Data Breaches
Welcome to this week’s Cyber Security Newsletter, where we explore the latest advancements and important updates in the field of cybersecurity. Your engagement in this swiftly changing digital landscape is