Uncategorized

CitrixBleed 2 Vulnerability: Proof-of-Concept Released, Widespread Threat Looms

A proof-of-concept (PoC) for CVE-2025-5777, dubbed "CitrixBleed 2," a critical memory disclosure vulnerability affecting Citrix NetScaler devices. The vulnerability, which…

10 months ago

Unleashing Threats – DeepSeek Installers Spread Sainbox RAT and Concealed Rootkit

A sophisticated new malware campaign has been uncovered by Netskope Threat Labs, targeting Chinese users through fake installers for popular…

10 months ago

WordPress Admins Alert: Beware of Fake SEO Plugins That Hijack Your Website

A sophisticated malware campaign targeting WordPress websites through fake plugins that cleverly disguise themselves using the victim's own domain name.…

10 months ago

Apache APISIX Vulnerability Enables Unauthorized Cross-Issuer Access via Misconfigurations

Apache APISIX, a popular open-source API gateway, has disclosed a critical security vulnerability affecting versions prior to 3.12.0 that could…

10 months ago

Instagram Implements 1-Week Validity TLS Certificates, Renewed Daily

Instagram implements an unusual certificate management strategy, replacing their TLS certificates on a daily basis using certificates with approximately one-week…

10 months ago

Next.js Cache Poisoning Vulnerability Let Attackers Trigger DoS Condition

A critical security vulnerability has been identified and patched in Next.js, the popular React-based web framework. The vulnerability, designated as…

10 months ago

Writable File in Lenovo Windows Directory Allows Stealthy AppLocker Bypass

A significant vulnerability affecting Lenovo machines that allows users to bypass AppLocker security controls through a writeable file located in…

10 months ago

Critical HIKVISION applyCT Vulnerability Exposes Devices to Remote Code Execution Risks

A critical vulnerability in HIKVISION's applyCT security management platform that could allow attackers to execute arbitrary code on affected systems…

10 months ago

Critical PHP Vulnerabilities Enable SQL Injection and DoS Attacks – Update Immediately

Critical security vulnerabilities have been discovered in PHP's PostgreSQL and SOAP extensions that could enable SQL injection attacks and denial…

10 months ago

Researchers Exploit HTML Injection to Bypass Content Security Policy

A sophisticated method to bypass Content Security Policy (CSP) nonces, a widely-used web security mechanism designed to prevent cross-site scripting…

10 months ago