D-Link NAS Command Injection Flaw : 92,000 Devices Affected
A new command injection vulnerability and a backdoor account have been discovered in D-Link Network Attached Storage devices, which affects D-Link NAS devices, including DNS-340L,…
A new command injection vulnerability and a backdoor account have been discovered in D-Link Network Attached Storage devices, which affects D-Link NAS devices, including DNS-340L,…
Chinese devices are suspected of administering cyber espionage due to concerns over potential backdoors, supply chain vulnerabilities, and the risk of tampering. State-sponsored cyber threats,…
Check Point Research has exposed a recent wave of cyberattacks utilizing the infamous Agent Tesla malware. This campaign targeted organizations in the United States and Australia.…
Cybercriminals are increasingly exploiting YouTube, a platform beloved by millions, to produce sophisticated malware attacks. These threat actors, leveraging the impression of free software and…
A new claim has surfaced on the internet regarding a zero-day exploit that targets the Windows operating system. This exploit, which enables local privilege escalation…
Over a million WordPress websites have been at risk due to a critical SQL Injection vulnerability discovered in the popular LayerSlider plugin. The flaw, CVE-2024-2879,…
The FCC (Federal Communications Commission) seeks public input regarding measures by communications providers to address vulnerabilities in SS7 and Diameter protocols that enable tracking consumers’…
A sophisticated variant of StrelaStealer malware has been identified, targeting Spanish-speaking users with the primary aim of pilfering email account credentials from popular email clients…
A security researcher reported a critical vulnerability in the WP-Members Membership Plugin that allows attackers to inject malicious scripts and potentially take over websites. Administrators…
The Security Police (Säpo) has disclosed that a Chinese hacker group, APT31, has commandeered Swedish routers to perpetrate cyber attacks against multiple countries. This sophisticated…
Google has unveiled a new web feature called “Device Bound Session Credentials (DBSC)” that will help protect users from cookie theft. Malware that steals cookies…
Antiviruses can quickly detect malicious executable files, but attackers can bypass this by using packers to compress and obfuscate the code, making it difficult for…