Zephyrnet Logo

Tag: remote code execution

Minimum Viable Compliance: What You Should Care About and Why

In the IT security space, we have to care about everything. Any issue, no matter how small, can become the vehicle for remote code...

Top News

Bricks Builder For WordPress RCE Vulnerability

Bricks Visual Site Builder for WordPress recently patched a critical severity vulnerability rated 9.8/10 which is actively being exploited right now.Bricks Builder Bricks Builder is...

Attackers Exploit Microsoft Security-Bypass Zero-Day Bugs

Microsoft's scheduled Patch Tuesday security update for February includes fixes for two zero-day security vulnerabilities under active attack, plus 71 other flaws across a...

Linux Distros Hit by RCE Vulnerability in Shim Bootloader

Linux shim, a small piece of code that many major Linux distros use during the secure boot process, has a remote code execution vulnerability...

Ivanti Zero-Day Patches Delayed as ‘KrustyLoader’ Attacks Mount

Attackers are using a pair of critical zero-day vulnerabilities in Ivanti VPNs to deploy a Rust-based set of backdoors, which in turn download a...

PoC Exploits Heighten Risks Around Critical New Jenkins Vuln

Some 45,000 Internet-exposed Jenkins servers remain unpatched against a critical, recently disclosed arbitrary file-read vulnerability for which proof-of-exploit code is now publicly available.CVE-2024-23897 affects...

Inside the Mind of a Cyber Attacker! – Supply Chain Game Changer™

In the perpetual game of cat and mouse between cyber attackers and defenders, the battleground is vast and dynamic. Understanding the Tactics, Techniques, and...

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections

A previously undocumented hardware feature within Apple's iPhone System on a Chip (SoC) allows for exploitation of multiple vulnerabilities, eventually letting attackers bypass hardware-based...

Critical Vulns Found in Ray Open Source Framework for AI/ML Workloads

Organizations using Ray, the open source framework for scaling artificial intelligence and machine learning workloads, are exposed to attacks via a trio of as...

Kinsing Cyberattackers Target Apache ActiveMQ Flaw to Mine Crypto

The attackers behind the Kinsing malware are the latest to exploit the Apache ActiveMQ critical remote code execution (RCE) vulnerability, targeting the flaw to...

A Detection and Response Benchmark Designed for the Cloud

The speed and sophistication of cloud attacks have rapidly narrowed the time security teams have to detect and respond before suffering a breach. According...

APTs Swarm Zimbra Zero-Day to Steal Government Info Worldwide

At least four separate cyberattack groups have used a former zero-day security vulnerability in the Zimbra Collaboration Suite (ZCS) to steal email data, user...

Microsoft Zero-Days Allow Defender Bypass, Privilege Escalation

Microsoft released fixes for a total of 63 bugs in its November 2023 update, including three that threat actors are actively exploiting already and...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?