CYBER ATTACKS
Veeam Backup Enterprise Manager Authentication Bypass Vulnerability
A critical security vulnerability has been detected in Veeam Backup Enterprise Manager (VBEM), posing significant threats to organizations utilizing this…
Critical XZ Utils Backdoor (CVE-2024-3094) Threatens Linux Security with SSH Compromise
A critical security flaw has recently emerged in the widely utilized XZ Utils package, identified as CVE-2024-3094. This flaw poses…
Veeam Backup Enterprise Manager Authentication Bypass Vulnerability
A critical security vulnerability has been detected in Veeam Backup Enterprise Manager (VBEM), posing significant threats to organizations utilizing this…
Critical XZ Utils Backdoor (CVE-2024-3094) Threatens Linux Security with SSH Compromise
A critical security flaw has recently emerged in the widely utilized XZ Utils package, identified as CVE-2024-3094. This flaw poses…
Reviews
Sharanu Kalyan, is a cybersecurity professional specializing in Network, API, Web, and mobile app security for Android and iOS platforms. have successfully pinpointed critical vulnerabilities in government websites and unearthed over 15 CVEs in WordPress plugins. Honored as one of NCIIPC India's Top 15 Security Researchers, I have received Hall of Fame accolades for significant discoveries in vulnerability assessments. My contributions to TheCyberShanks.com include up-to-date coverage of data breaches Zerodays, and cybersecurity updates.
CYBER EVENTS
Attackers Exploit SMTP Smuggling: Bypassing Email Authentication through Spoofed Emails
An emerging exploitation method known as Simple Mail Transfer Protocol (SMTP) smuggling is being exploited by malicious actors to send…
Veeam Backup Enterprise Manager Authentication Bypass Vulnerability
A critical security vulnerability has been detected in Veeam Backup Enterprise Manager (VBEM), posing significant threats to organizations utilizing this…
JetBrains TeamCity Flaws Could Lead to Server Takeovers
Recent reports have highlighted critical vulnerabilities in the JetBrains TeamCity On-Premises software, which could potentially lead to unauthorized access and…
Kansas City Area Transportation Authority Targeted by Ransomware Attack, Medusa Gang Claims Responsibility
Kansas City Area Transportation Authority Targeted by Ransomware Attack, Medusa Gang Claims Responsibility On January 23, 2023, the Kansas City…
Recent Posts
CVE-2024-6387: The OpenSSH Regression Vulnerability
Understanding the OpenSSH Regression Vulnerability: CVE-2024-6387 In the realm of cybersecurity, vigilance is not a luxury but a necessity. The…
Exploit for Fortinet FortiSIEM RCE Bug CVE-2024-23108 Now Available
The recent emergence of a critical vulnerability in Fortinet’s Security Information and Event Management (SIEM) solution, FortiSIEM, has sparked significant…
Veeam Backup Enterprise Manager Authentication Bypass Vulnerability
A critical security vulnerability has been detected in Veeam Backup Enterprise Manager (VBEM), posing significant threats to organizations utilizing this…
Critical Flaw Alert: “Linguistic Lumberjack” Impacting Major Cloud Services
A significant vulnerability has surfaced, causing a major disruption in Fluent Bit, a widely-used logging and metrics tool. Tenable Research…
Critical CVE-2024-2879: LayerSlider WordPress Plugin Vulnerable to SQL Injection
A critical vulnerability that has been identified in the LayerSlider plugin for WordPress. This particular flaw exposes websites to the…
JetBrains TeamCity Flaws Could Lead to Server Takeovers
Recent reports have highlighted critical vulnerabilities in the JetBrains TeamCity On-Premises software, which could potentially lead to unauthorized access and…
Categories
- Blog (9)
- Chrome (2)
- cisco (1)
- Cloud security (1)
- Crypto Scam (1)
- Cryptocurrency (2)
- Cryptojacking (1)
- CVE (20)
- Cyber News (9)
- cyber security (2)
- Data breaches (1)
- Email security (1)
- Email spoofing (1)
- Fashion (1)
- Guide (1)
- malware (1)
- Malware attack (1)
- Mandiant (1)
- News (15)
- OpenSSH (1)
- Password attack (1)
- Patch (6)
- Payment Security (1)
- phishing (1)
- ransomware (2)
- RCE (9)
- SMTP Smuggling (1)
- SQL injection attack (1)
- XSS attacks (2)
- zeroday (9)
Stay connected