Six new zero-day vulnerabilities in Exim Message Transfer Agent have been reported as part of the Zero-Day initiative. These vulnerabilities were discovered in June 2022 but were not disclosed until now as Exim did not fix them. ...
Microsoft has addressed two zero-day vulnerabilities in two Open-Source Software security vulnerabilities, which include Microsoft Edge, Microsoft Teams for Desktop, Skype for Desktop, and Webp images extension. These vulnerab ...
Three new zero days have been reported to Qualcomm, which were CVE-2023-33106, CVE-2023-33107, and CVE-2023-33063. These vulnerabilities were discovered as part of Google Project Zero and were disclosed to Qualcomm by Google Thre ...
Sony Interactive Entertainment (SIE) discloses a cybersecurity breach caused by the exploitation of a zero-day vulnerability in Progress Software’s MOVEit Transfer platform. Nearly 6791 current and former workers or members of ...
Apple has discovered a Zero-day vulnerability affecting iOS and iPadOS versions earlier than 17.0.3, which could allow threat actors to elevate their privileges. The CVE for this vulnerability has been given as CVE-2023-42824, an ...
Securing the devices running iOS and Android operating systems is now costly due to improved defenses. According to a recent report by TechCrunch, there has been a surge in the demand for zero-day exploits that can be used to ...
Cloudflare was unexpectedly hit by an enormous HTTP attack that peaked at over 201 million requests per second. Starting on August 25, 2023, this onslaught posed a significant challenge, especially considering that it was init ...
Microsoft has detected the nation-state threat actor Storm-0062, also known as DarkShadow or Oro0lxy, exploiting CVE-2023-22515 in the wild since September 14, 2023. The vulnerability was publicly disclosed on October 4, 2023 ...
A serious security flaw in some versions of Atlassian Confluence Data Center and Server has been exploited by hackers. They have used this flaw to create fake admin accounts and access Confluence servers. This flaw is called ...
Hackers usually opt for zero-day vulnerabilities because they are not publicly known, making them more difficult for defenders to patch or protect against. This gives hackers an advantage by exploiting a flaw before it’s disc ...