Home

iTunes for Windows Vulnerability Enables Malicious Code Execution

iTunes has an arbitrary code execution vulnerability, potentially enabling attackers to execute malicious code. Apple has issued a security advisory to address this. The company stated it won't discuss or [...]

Proof-of-Concept (PoC) Released for Critical PuTTY Private Key Recovery Vulnerability

Security researchers have published a Proof-of-Concept (PoC) exploit for a critical vulnerability in the widely used PuTTY SSH and Telnet client. The flaw, CVE-2024-31497, permits attackers to recover private keys [...]

Microsoft Edge Zero-Day Exploit Detected in Live Attacks

A zero-day vulnerability in Microsoft Edge, identified as CVE-2024-4671, has been actively exploited by malicious organizations, as reported. This security flaw originates from the Chromium engine, which powers the browser. [...]

Critical Cacti Vulnerability Enables Remote Code Execution by Attackers

Cacti, a widely used network monitoring tool, has released a critical security update addressing various vulnerabilities, notably CVE-2024-25641, rated with a high severity score of 9.1 on the CVSS scale, [...]

New F5 Next-Gen Manager Vulnerability Enables Attackers to Obtain Full Admin Control

Two critical vulnerabilities in F5 Next-Gen Big IP have been uncovered, enabling threat actors to attain full administrative control of the device and establish accounts on any F5 assets. These [...]

Subscribe to our newsletter to receive security tips everday!