Microsoft Edge Zero-Day Exploit Detected in Live Attacks
A zero-day vulnerability in Microsoft Edge, identified as CVE-2024-4671, has been actively exploited by malicious organizations, as reported. This security flaw originates from the Chromium engine, which powers the browser. [...]
Critical Cacti Vulnerability Enables Remote Code Execution by Attackers
Cacti, a widely used network monitoring tool, has released a critical security update addressing various vulnerabilities, notably CVE-2024-25641, rated with a high severity score of 9.1 on the CVSS scale, [...]
New F5 Next-Gen Manager Vulnerability Enables Attackers to Obtain Full Admin Control
Two critical vulnerabilities in F5 Next-Gen Big IP have been uncovered, enabling threat actors to attain full administrative control of the device and establish accounts on any F5 assets. These [...]
Dell Breached: Attackers Acquire Personal Information of 49 Million Customers
Dell Technologies recently disclosed a data breach involving a company portal containing limited customer information related to purchases, exposing names, physical addresses, and detailed order information such as service tags, [...]
CrushFTP vulnerability exploited in the wild to execute remote code
A critical vulnerability, CVE-2024-4040, has been actively exploited in the wild in CrushFTP. This flaw permits attackers to execute unauthenticated remote code on vulnerable servers. Versions of CrushFTP prior to [...]