Description Microsoft has issued a warning regarding the misuse of exposed ASP.NET machine keys in ViewState code injection attacks. These attacks lev . . . Read more
Description Netgear has identified and patched two critical vulnerabilities affecting multiple WiFi router models, including WiFi 6 access points (WAX . . . Read more
Description Cisco has released patches for two critical vulnerabilities in its Identity Services Engine (ISE) security policy management platform. The . . . Read more
Description A newly identified attack campaign by the Chinese cyber-espionage group Evasive Panda (DaggerFly) involves the hijacking of the SSH daemon . . . Read more
Description Process Hollowing is a code injection technique commonly employed by malware to evade detection. It involves creating a legitimate proces . . . Read more
Description A phishing campaign has been identified, targeting Microsoft advertisers through malicious Google Ads. Attackers are leveraging sponsored . . . Read more
Description A newly discovered ChatGPT jailbreak, dubbed Time Bandit, enables users to bypass OpenAI’s safety measures and gain access to restr . . . Read more
Description Rockstar 2FA is a new phishing-as-a-service (PhaaS) platform facilitating adversary-in-the-middle (AiTM) attacks to compromise Microsoft 3 . . . Read more
Description BootKitty is a newly identified UEFI (Unified Extensible Firmware Interface) bootkit targeting Linux systems, exploiting a firmware vulner . . . Read more
Description Cybercriminals have leveraged the popular open-source Godot game engine to distribute malware through a new tool called GodLoader. This ma . . . Read more
Description GhostSpider is a sophisticated backdoor malware employed by the Salt Typhoon hacking group, also known as Earth Estries or UNC2286. This g . . . Read more
Description Hackers have exploited two recently patched zero-day vulnerabilities in Palo Alto Networks PAN-OS software, compromising over 2,000 firewa . . . Read more