Cyber Attack
Stuxnet, The Malware That Propagates To Air-Gapped Networks
Stuxnet, a complex worm discovered in 2010, targeted Supervisory Control and Data Acquisition (SCADA) systems used in industrial facilities.By exploiting multiple vulnerabilities, including...
CVE/vulnerability
SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files
SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a threat actor to read sensitive files on the host machine.This...
CVE/vulnerability
Muhstik Malware Attacking Apache RocketMQ To Execute Remote Code
Apache RocketMQ platform is a widely used messaging system that handles high volumes of data and critical operations, often attracting hackers. Exploiting the vulnerabilities in...
CVE/vulnerability
NSA Releases Guidance On Zero Trust Maturity To Secure Application From Attackers
Zero Trust Maturity measures the extent to which an organization has adopted and implemented the Zero Trust security model. It calculates how fully a company...
CVE/vulnerability
Chinese Hackers Stay Hidden On Military And Government Networks For Six Years
Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of critical infrastructure. This is mainly...
CVE/vulnerability
DNSBomb : A New DoS Attack That Exploits DNS Queries
A new practical and powerful Denial of service attack has been discovered that exploits DNS queries and responses.This new attack has been termed...
CVE/vulnerability
Russian APT Hackers Attacking Critical Infrastructure
Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated cybercriminals to achieve its strategic goals, as APT groups conduct...
CVE/vulnerability
Vmware Workstation & Fusion Flaws Let Attackers Execute Arbitrary Code
Multiple security flaws affecting VMware Workstation and Fusion have been addressed by upgrades published by VMware.If these vulnerabilities are successfully exploited, attackers may be...