Cyber security news for all

More

    Vulnerabilities

    Azure Service Tags Vulnerability: Microsoft Warns of Potential Abuse by Hackers

    Microsoft has issued a caution regarding the possible exploitation of Azure Service Tags by malicious actors. These perpetrators could craft requests that appear to...

    Oracle WebLogic Server Command Injection Vulnerability Under Active Assault

    On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) incorporated a security defect impacting the Oracle WebLogic Server into the Known Exploited Vulnerabilities...

    OpenAI, Meta, and TikTok Combat Stealth Influence Operations, Some Fueled by AI

    On Thursday, OpenAI disclosed its intervention against five clandestine influence operations (IO) hailing from China, Iran, Israel, and Russia. These operations aimed to misuse...

    Researchers Unearth Ongoing Exploitation of WordPress Plugin Vulnerabilities

    Cybersecurity sleuths have sounded the alarm on numerous critical security flaws in WordPress plugins being actively manipulated by nefarious actors to establish rogue administrator...

    Researchers Sound Alarm on CatDDoS Botnet and DNSBomb DDoS Assault Technique

    The malicious entities orchestrating the CatDDoS malware botnet have exploited more than 80 known security vulnerabilities across various software platforms in the past quarter,...

    Google Uncovers Fourth Chrome Zero-Day Exploit in May Actively Under Attack – Update ASAP

    On Thursday, Google issued patches to rectify a high-severity security vulnerability in its Chrome browser, which has been actively exploited. Designated as CVE-2024-5274, this flaw...

    Recent Articles