Chinese Hackers Exploit Zero-Day Flaws in Ivanti VPN
Chinese hackers have strategically exploited zero-day vulnerabilities within Ivanti’s Connect Secure (ICS) and Policy Secure, utilizing a sophisticated attack chain…
North Korean Hackers Stole $600M Cryptocurrency in 2023
In 2023, TRM Labs reveals the staggering $600 million cryptocurrency heist executed by hackers from North Korea Cryptocurrency theft has…
Attackers Exploit SMTP Smuggling: Bypassing Email Authentication through Spoofed Emails
An emerging exploitation method known as Simple Mail Transfer Protocol (SMTP) smuggling is being exploited by malicious actors to send…
Critical Update: Patching the Heap Buffer Overflow in Chrome’s WebRTC
Recent disclosures have brought attention to a highly significant vulnerability, known as CVE-2023-7024, which affects both Google Chrome and Microsoft…
Hackers Bypass Passwords Exploiting Google OAuth Endpoint to Access Accounts
Hackers have discovered and taken advantage of a vulnerability present in Google’s OAuth endpoint within the current cyber threat landscape….
Microsoft’s critical RCE: Securing Your Perforce Helix Core Server from Exploits
In August 2023, Microsoft’s security analysts unearthed critical vulnerabilities within the Perforce Helix Core Server, a widely utilized source code…