Vulnerability

Researcher Hacks CI/CD Pipelines for Full Server Access

A publicly exposed `.git` directory, a common oversight in modern development, served as the initial vulnerability, which contained sensitive information, including source code and...

Hackers Exploit GeoServer RCE Vulnerability to Spread Malware

GeoServer versions prior to 2.23.6, 2.24.4, and 2.25.2 are susceptible to remote code execution, where attackers can exploit this critical vulnerability to gain unauthorized...

Akira Ransomware Exploits SonicWall Firewall RCE Vulnerability

The SonicOS remote code execution vulnerability (CVE-2024-40766) has been actively exploited since its disclosure, which impacts SonicWall firewall devices, allowing attackers to gain unauthorized...

ToneShell: The Backdoor Exploiting RDP Certificates to Target VIPs

The ToneShell backdoor, a cyber espionage tool associated with the Mustang Panda threat group, has been used to target attendees of the 2024 IISS...

Revival Hijacking: Exploiting PyPI Packages in the Wild

The "Revival Hijack" technique exploits a vulnerability in PyPI's package removal process. When a popular package is deleted, its name becomes immediately available for...

Popular

Subscribe

spot_imgspot_img