Home 2017-08-28T17:57:09+05:30

Chrome UAF Vulnerabilities: Active Exploits

Researchers discovered two critical UAF vulnerabilities in Chrome, actively exploited in the wild, but Google’s MiraclePtr defense has now blocked them, strengthening browser security. All about the Chrome UAF vulnerability [...]

Ivanti 0-Day Exploited for DslogdRAT & Web Shell

Threat actors have exploited a zero-day flaw in Ivanti Connect Secure (CVE-2025-0282) to install a web shell and a remote access trojan (DslogdRAT), according to JPCERT/CC. How DslogdRAT and the [...]

Commvault RCE Exploited, PoC Available

A major remote code execution (RCE) vulnerability, CVE-2025-34028, has been discovered in Commvault’s on-premise backup and recovery software, posing serious risks to enterprises and managed service providers worldwide. Commvault RCE [...]

NFC Exploited to Steal Funds from ATMs and POS

NFC Technology Abused in Global ATM and POS Fraud Cybercriminals, mainly from Chinese underground networks, are using NFC (Near Field Communication) technology to carry out large-scale fraud at ATMs and [...]

TP-Link Router Vulnerabilities Enable Malicious SQL Execution

Cybersecurity researchers have found critical SQL injection vulnerabilities in four TP-Link router models, which could allow attackers to bypass authentication, execute malicious commands, and potentially take control of the devices. [...]

Subscribe to our newsletter to receive security tips everday!