Home 2017-08-28T17:57:09+05:30

CISA warns of active exploitation of Microsoft zero-day vulnerabilities

CISA warns of two critical Microsoft zero-day vulnerabilities, CVE-2024-43572 and CVE-2024-43573, actively exploited in the wild. CVE-2024-43572 The first vulnerability, CVE-2024-43572, affects the Microsoft Windows Management Console, allowing attackers to [...]

Hackers breached the president’s account of a Japanese aerospace company

Hackers infiltrated JAXA, compromising top officials' accounts, including President Hiroshi Yamakawa, in a series of cyberattacks since June 2023. Since mid-2023, JAXA has been hit by four significant cyberattacks. In [...]

By | October 9th, 2024|Internet Security, Security Advisory, Security Update, Tips|0 Comments

LemonDuck malware targets Windows servers by exploiting SMB vulnerabilities

Attackers used the EternalBlue vulnerability to access the observatory farm, create a hidden admin share, and run a malicious batch file named p.bat, which opened firewall ports, set up port [...]

By | October 8th, 2024|Malware, Security Advisory, Security Update, vulnerability|0 Comments

Cacti vulnerability allows attackers to execute remote code

A critical vulnerability in the Cacti network monitoring tool, discovered in version 1.2.28, could allow attackers to execute remote code on affected systems. This flaw is particularly concerning for system [...]

CVE-2024-30052: RCE vulnerability in Visual Studio via dump files

A researcher identified a method to exploit Visual Studio by executing arbitrary code during the debugging of managed dump files, without needing memory corruption or specific PDB file components. By [...]

Subscribe to our newsletter to receive security tips everday!