Vulnerabilities & Threats

Fresh bug in VMware vCenter is already under attack

An exploit for the recently fixed RCE vulnerability in VMware vCenter (CVE-2021-22005) has been published online. Experts warned that hackers had already adopted the exploit. The...

Attackers scan the network looking for Microsoft Exchange servers vulnerable to ProxyShell

Recently at the Black Hat conference, they talked about the remote code execution vulnerabilities in Microsoft Exchange, collectively known as ProxyShell. Now experts are warning...

Chrome 0-day vulnerability – 8th Vulnerability this year

Google developers have released an updated version of the Chrome browser for Windows, Mac and Linux ( 91.0.4472.164 ), which eliminated a zero-day vulnerability in the...

Unofficial patch for PrintNightmare vulnerability

Last week, we reported  that a PoC exploit appeared on the network for the dangerous vulnerability CVE-2021-34527 in Windows Print Spooler (spoolsv.exe), which the researchers named...

PrintNightmare vulnerability : Microsoft warns of attempts to exploit

Microsoft has not announced when the patch for the vulnerability will be released. Microsoft has officially confirmed that the acclaimed remote code execution vulnerability known as PrintNightmare...

Vulnerable Microsoft Exchange Servers Attacked by Prometei Botnet

Since the patches for ProxyLogon problems were still not fully installed, attackers continue to attack vulnerable Microsoft Exchange servers. Now researchers from Cybereason Nocturnus have discovered the Prometei botnet, which mines Monero cryptocurrency on vulnerable machines.

Google Docs Vulnerability allowed to view other people’s documents

Google has patched a vulnerability in its feedback tool used in its services. The vulnerability made it possible to steal screenshots of confidential documents from...

Hackers Sell RDP, DDoS attacks and payment card data on the darknet

Cybersecurity researchers at Flashpoint reported rising prices for access to RDP servers, stolen payment card data, and a DDoS-as-a-service business model in underground forums and marketplaces. “As...

Latest news

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Fresh bug in VMware vCenter is already under attack

An exploit for the recently fixed RCE vulnerability in VMware vCenter (CVE-2021-22005) has been published online. Experts warned that hackers...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

Nissan source code leaked due to admin: admin credentials

The source code of mobile applications and internal tools...

Saferwall : Open Source Malware Analysis

Saferwall is an open source malware analysis platform. It...