Uncategorized

Tesla Wall Charger Vulnerability Exposed in Swift 18-Minute Attack

A critical vulnerability in Tesla's Wall Connector home charging stations, proving that attackers can gain control of the devices through…

10 months ago

Hackers Exploit Atlassian’s Model Context Protocol via Malicious Support Ticket

A critical vulnerability in AI-integrated enterprise systems that allows threat actors to gain privileged access through seemingly innocent support tickets.…

10 months ago

New Nday Vulnerability in Zyxel NWA50AX Pro Enables Arbitrary File Deletion

A vulnerability researcher has discovered a critical security vulnerability in Zyxel NWA50AX Pro WiFi 6 access points that allows unauthenticated…

10 months ago

Attackers Exploit Apple Pay and GPay to Steal Funds

Mobile wallets such as Apple Pay and Google Pay have revolutionized payment systems by enabling contactless transactions, but their convenience…

10 months ago

Microsoft Defender Adds Feature to Block Email Bombing

A significant security enhancement to its Defender for Office 365 platform with the introduction of Mail Bombing Detection, a new…

10 months ago

VMware Cloud Foundation 9.0 Launches with AI & Modern Workload Support

VMware has announced the general availability of VMware Cloud Foundation (VCF) 9.0, marking a significant evolution in private cloud infrastructure…

10 months ago

Critical Chrome Vulnerabilities Allow Remote Code Execution – Update Immediately!

An urgent security update for its Chrome browser, addressing critical vulnerabilities that could allow attackers to execute arbitrary code on…

10 months ago

WormGPT: A BlackHat AI Hacking Tool Powered by Grok and Mixtral

A uncovered previously unreported variants of WormGPT, a notorious uncensored AI tool designed for malicious activities. These new variants, discovered…

10 months ago

Critical Privilege Escalation Vulnerabilities Grant Full Root Access on Linux

A critical security vulnerabilities that can be chained together to allow unprivileged attackers to gain complete root access on Linux…

10 months ago

CISA Alerts on Exploited Linux Kernel Ownership Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory about a critical Linux kernel vulnerability (CVE-2023-0386) actively…

10 months ago