VMware has released security updates to address a critical SQL injection vulnerability in its Aria Automation product. The vulnerability tracked as CVE-2024-22280, could allow authenticated attackers to perform unauthorized database
All posts by admin
Critical PHP Vulnerability CVE-2024-4577 Actively Exploited in the Wild
A critical vulnerability in PHP, tracked as CVE-2024-4577, is being actively exploited by threat actors in wild just days after its public disclosure in June 2024. The flaw affects PHP
Hackers Weaponizing Shortcut Files With Zero-day Tricks To Attack Windows Users
Hackers weaponize shortcut files because they are an inconspicuous way to execute malicious code on a target system. These files can be disguised as harmless icons but actually contain commands
Hackers Claiming 8 Million Angel One Customers Data Exposed, Company Denies
Hackers have claimed that the personal data of 8 million customers of Angel One, a prominent broking house, has been exposed. The news report has sent shockwaves through the financial
Evolve Bank Data Breach: 7.6 Million Individuals’ Data Exposed
Evolve Bank & Trust, a prominent financial services institution, has confirmed a data breach that has compromised the personal information of over 7.6 million individuals. The breach, which occurred on
Fujitsu Cyber Attack: Customers’ Personal Information Exposed
Fujitsu Limited has disclosed the results of an investigation into a cyberattack that potentially exposed customers’ personal information. The breach, first announced on March 15, 2024, was caused by sophisticated
Cloud-Based Investigations Platform Targets Complexity in Incident Response
Attackers Already Exploiting Flaws in Microsoft’s July Security Update
Exclusive! Analysis of 3 Ransomware Threats Active Right Now
Ransomware continues to loom large over the cybersecurity landscape, causing significant damage to individuals and organizations alike. With the difficulty of recovering encrypted files and the potential exposure of stolen
Researcher Exploits Browser Rendering Process to Alter PDF Invoice Pricing
A cybersecurity researcher, Zakhar Fedotkin, demonstrated how differences in PDF rendering across various browsers and operating systems can be exploited to manipulate the displayed pricing on PDF invoices. This vulnerability

