- Details
- Muktar Yahuza
Several vulnerabilities have been identified in Microsoft Edge. A remote attacker could exploit these to cause denial-of-service conditions or execute code remotely on the targeted system. Read More..
- Details
- Muktar Yahuza
Numerous vulnerabilities have been detected in Cisco products. A remote attacker could leverage these weaknesses to cause denial of service, elevate privileges, disclose sensitive information, bypass security restrictions, conduct spoofing attacks, and manipulate data. Read More..
- Details
- Muktar Yahuza
Numerous vulnerabilities have been detected in Cisco products. A remote attacker could leverage these weaknesses to cause denial of service, elevate privileges, disclose sensitive information, bypass security restrictions, conduct spoofing attacks, and manipulate data. Read More..
- Details
- Muktar Yahuza
The Lazarus Group, a North Korean threat actor, has been linked to the exploitation of a zero-day vulnerability in Google Chrome. This security flaw, now patched, allowed them to gain control over compromised devices. Read More..
- Details
- Muktar Yahuza
Google has revealed the launch of new features for its Chrome browser, aimed at giving users greater control over their data while browsing the web and enhancing protection against online threats. Read More..
- New "Raptor Train" IoT Botnet Compromises Over 200,000 Devices Worldwide
- Quad7 Botnet Grows to Attack SOHO Routers and VPN Devices
- Microsoft Releases Fixes for 79 Vulnerabilities, Including 3 Actively Exploited Windows Flaws
- PEAKLIGHT Downloader Deployed in Attacks Targeting Windows with Malicious Movie Downloads
- RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors