Tag: vulnerable

ZKTeco Biometric System Discovered Susceptible to 24 Vital Safety Flaws

î ‚Jun 14, 2024î „NewsroomGadget Safety / Authentication An evaluation of a hybrid biometric entry system from Chinese language producer ZKTeco has uncovered two dozen safety flaws...

GHOSTENGINE Exploits Weak Drivers to Disable EDRs in Cryptojacking Assault

Cybersecurity researchers have found a brand new cryptojacking marketing campaign that employs susceptible drivers to disable recognized safety options (EDRs) and thwart detection in...

GhostEngine mining assaults kill EDR safety utilizing weak drivers

A malicious crypto mining marketing campaign codenamed 'REF4578,' has been found deploying a malicious payload named GhostEngine that makes use of weak drivers to show off safety...

Over 50,000 Tinyproxy servers weak to important RCE flaw

Almost 52,000 internet-exposed Tinyproxy situations are weak to CVE-2023-49606, a lately disclosed important distant code execution (RCE) flaw. Tinyproxy is an open-source HTTP and HTTPS...

Widespread Android Apps Like Xiaomi, WPS Workplace Weak to File Overwrite Flaw

î ‚Might 02, 2024î „NewsroomVulnerability / Android A number of well-liked Android purposes obtainable in Google Play Retailer are prone to a path traversal-affiliated vulnerability that might...

Over 1,400 CrushFTP servers weak to actively exploited bug

​Over 1,400 CrushFTP servers uncovered on-line had been discovered weak to assaults at the moment concentrating on a important severity server-side template injection (SSTI) vulnerability...
spot_imgspot_img

Subscribe

Popular articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

î ‚Jan 17, 2025î „Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...