Tuesday, November 12, 2024
Tag:

Exploit

Critical Vulnerability in Microsoft Azure Let Hackers Take Over the Complete Control of the Azure Accounts

Researchers discovered a critical vulnerability in Microsoft Azure named "BlackDirect" that allows attackers to take over the Azure user's accounts and create the Token...

Hackers Actively Scanning & Constantly Attempt To Exploit Citrix ADC Vulnerabilities

Recently, the Citrix published a set of 11 vulnerabilities in its most popular products that includes Citrix ADC as well, new research found that...

SMBleed – Windows SMB Protocol Bug Let Hackers Leak Kernel Memory & Execute a Code Remotely

Researchers uncovered a critical bug names as "SMBleed" in the Microsoft Server Message Block (SMB) network communication protocol.This security flaw was named as SMBleed...

Researchers Exploit Almost Every Anti-Virus Software & Turn Them Into Self Destructive Tools

Researchers uncovered a simple flaw that existed in nearly 28 Antivirus software that allows malware authors to exploit the system and disable the Antivirus...

Proof-of-Concept Exploits Released for The Microsoft-NSA Crypto vulnerability – CVE-2020-0601

Less than a day after Microsoft disclosed one of the most critical Windows vulnerabilities ever, security researchers have published PoC Exploit that explains how...

Urgent !! Windows User Urged to Patch A Critical Crypto Vulnerability on Windows 10, Clients & Servers Discovered By NSA

Windows users are recommended to immediately patch the critical Cryptographic vulnerability that existing in the Windows CryptoAPI (Crypt32.dll) that affected Windows cryptographic functionality...

Alert!! Critical Firefox Zero-Day Vulnerability Actively Exploit by Hackers in Wide – Update Firefox Now

Mozilla released a security update for a critical zero-day vulnerability that affects the Firefox browser and the vulnerability fixed in 72.0.1 and Firefox ESR...

3 Critical RCE Vulnerability That Affects Ruckus Wireless Routers Let Hackers Exploit the Routers Remotely

A security researcher discovered a 3 critical remote code execution vulnerabilities in Ruckus Wireless routers let malicious hackers bypass the routers and take control...