OAuth2 Session Hijack Vulnerability: Details Uncovered
A sophisticated exploit targeting Google's OAuth2 authentication system was uncovered by Prisma…
Microsoft Disables MSIX App Installer Protocol
Microsoft reportedly disabled MSIX installer protocol in Windows, due to its exploitation…
WordPress Critical Vulnerability Fixed in Patch 6.4.2
WordPress has rolled out version 6.4.2, addressing a critical remote code execution…
BLUFFS Bluetooth Vulnerability Threatens Billions of Devices
Eurecom has uncovered a series of exploits named "BLUFFS", posing a significant…
Zimbra Vulnerability Exploited in the Wild
Google TAG's recent discovery reveals a 0-day exploit, CVE-2023-37580, targeting Zimbra Collaboration.…
VMWare Cloud Director Vulnerability Circumvents Authentication
VMware, a key player in virtualization services, is reaching out to users…
New F5 BIG-IP Vulnerabilities Exploited In The Wild
Two new vulnerabilities in F5 BIG-IP reportedly allow for remote code execution…
New Confluence Vulnerability Leads to Unauthorised Access
Another vulnerability in the flagship product of Atlassian corporation, Confluence, allows hackers…
Can Zero-Day Attacks Be Prevented With Patches?
In recent years, zero-day exploits and attacks have become prominent emerging threats.…
GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users
Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called…
Vulnerability in WordPress Plugin WooCommerce Payments Is Actively Used to Hack Sites
Hackers use a vulnerability in the widely used WooCommerce Payments WordPress plugin…
Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing
In June, researchers revealed a vulnerability in Azure Active Directory and third-party…