Citrix NetScaler Flaws Leads to DoS Attack & Data Exposure
Critical vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have exposed sensitive information and a denial of service attack. A malicious cyber actor can exploit one of…
Critical vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway have exposed sensitive information and a denial of service attack. A malicious cyber actor can exploit one of…
The Democratic People’s Republic of Korea continues to advance its offensive cyber program, showcasing its unwavering commitment to using cyber attacks for espionage purposes. According…
A new web skimming campaign has been discovered, which targets multiple organizations in the food and retail industries. This campaign was unique as it included…
On Tuesday, Air Europa, a Spanish airline, experienced a security breach where cybercriminals gained unauthorized access to the credit card information of the airline’s customers.…
Multiple Google services and Cloud users were allegedly the target of a unique HTTP/2-based DDoS attack. The attack used a cutting-edge method known as HTTP/2 Rapid Reset,…
Microsoft has published its October security patches in which over 100 vulnerabilities were fixed in multiple Microsoft products, including Windows 10, Windows 11, Windows Server,…
Protecting personal data is a growing concern, with local storage as the last line of defense. Even here, precautions are needed against adversaries like thieves,…
A command injection vulnerability has been discovered in the D-Link DAP-X1860 range extender, allowing threat actors to execute remote code on affected devices. The CVE…
Your perceived reality can differ from the .NET code you observe in debuggers like dnSpy, raising questions about its behavior beyond debugging. Enhance .NET app…
The latest version of Cobalt Strike 4.9 is now available. This release includes improvements to Cobalt Strike’s post-exploitation capabilities, including the ability to export Beacon…
In September 2023, FortiGuard Labs’ vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign. This campaign, known for its aggressive tactics, had…
A new zero-day vulnerability has been discovered in Apple’s macOS systems, which allows threat actors to execute code on behalf of a legitimate Apple application.…