LATEST

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

PowerShell malware created with artificial intelligence (AI) tools has been seen to be used by the North Korean threat actor Konni to target blockchain

Critical Python PLY Library Vulnerability Enables Remote Code Execution

Critical Python PLY Library Vulnerability Enables Remote Code Execution

CYBER ATTACKZerowl

The Python PLY (Python Lex-Yacc) library has been found to have a serious security flaw that permits remote code execution (RCE) via an undocumented

CISA Releases Secure Connectivity Principles Checklist for OT Network Connectivity

CISA Releases Secure Connectivity Principles Checklist for OT Network Connectivity

CYBER ATTACKZerowl

In partnership with international cybersecurity partners such as the National Cyber Security Centre (NCSC) of the United Kingdom, the Australian Cyber

Backdoor Flaw Hits 20,000 WordPress Sites, Enables Stealthy Admin User Creation

Backdoor Flaw Hits 20,000 WordPress Sites, Enables Stealthy Admin User Creation

CYBER ATTACKZerowl

Over 20,000 active installations of the LA-Studio Element Kit for Elementor WordPress plugin are vulnerable to unauthenticated attacks due to a critical

Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request

Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request

CYBER ATTACKZerowl

By exploiting flaws in the business software that operates on their job sites, attackers are increasingly focusing on construction companies.

Systems are vulnerable to crashes and data corruption due to an Apache Hadoop vulnerability.

Systems are vulnerable to crashes and data corruption due to an Apache Hadoop vulnerability.

CYBER ATTACKZerowl

A serious flaw in the HDFS native client of Apache Hadoop, a popular distributed storage and processing framework, could allow hackers to cause system

Vulnerabilities in Apache Hadoop Expose Systems Possible Data Corruption or Crashes

Vulnerabilities in Apache Hadoop Expose Systems Possible Data Corruption or Crashes

CYBER ATTACKZerowl

Through maliciously constructed URI inputs, a moderate-severity vulnerability in the Hadoop Distributed File System (HDFS) native client could enable

6.5M Instagram and 48M Gmail were exposed online due to an unprotected database.

6.5M Instagram and 48M Gmail were exposed online due to an unprotected database.

CYBER ATTACKZerowl

An enormous database with 149 million stolen login credentials was found to be publicly accessible online without encryption or password protection This

Top 5 this week

Page 180 of 201