Vulnerability

YubiKey Flaw Exposed: Hackers Can Clone Your Device by Extracting Secret Keys

A critical vulnerability has been identified in Infineon's cryptographic library, which is used in YubiKey 5 Series, Security Key Series, and YubiHSM 2 devices...

WPS Office Vulnerability Allows Arbitrary Code Execution

APT-C-60, a South Korea-aligned cyberespionage group, exploited a code execution vulnerability (CVE-2024-7262) in WPS Office for Windows to target East Asian countries.  Upon analyzing the...

WinRAR Vulnerability (CVE-2023-38831) Exploited to Attack Windows & Linux

Head Mare, a hacktivist group targeting Russian and Belarusian organizations, uses the CVE-2023-38831 vulnerability to gain initial access, delivering a malicious payload disguised as...

Confluence Exploit Drops Godzilla Fileless Backdoor on Atlassian Servers

A new attack vector exploits the CVE-2023-22527 vulnerability in older Atlassian Confluence versions to deploy the in-memory Godzilla backdoor.  A loader is initially introduced into...

Corona Mirai Botnet Exploits Zero-Day to Recruit New Bots

The RCE vulnerability CVE-2024-7029 in AVTECH IP camera devices allows attackers to remotely execute commands with elevated privileges, which can be used to spread...

Popular

Subscribe

spot_imgspot_img