SolarWinds: Serious RCE vulnerabilities discovered
Security researchers have uncovered three critical remote code execution (RCE) vulnerabilities within the SolarWinds Access Rights Manager (ARM) product. These vulnerabilities could potentially be exploited by remote attackers to run [...]
Zero-Day Vulnerabilities in Citrix NetScaler and WinRAR Are Under Active Exploitation (CVE-2023-4966, CVE-2023-38831)
Threat actors are currently exploiting critical vulnerabilities in Citrix NetScaler and WinRAR, posing a significant risk to a variety of targets, including government organizations. In a recent report, researchers exposed [...]
SpyNote: Android spyware records your calls
Security researchers conducted an analysis of the Android trojan called SpyNote, revealing numerous spyware capabilities associated with it. SpyNote: Android spyware F-Secure reports that the trojan in question is typically [...]
Fake browser updates are used to distribute malware
Cybercriminals are increasingly employing counterfeit browser updates that imitate genuine notifications from Google Chrome, Mozilla Firefox, and Microsoft Edge to distribute malware on victims' computers. Fake browser updates A recent [...]
User Submitted Posts: Vulnerability found in WordPress plugin
His team at Patch Stack recently uncovered a fresh vulnerability in the WordPress plugin "User Submitted Posts," affecting versions from 20230902 onwards. With over 20,000 active installations, this popular plugin [...]