Isreali NSO Group’s Pegasus Spyware Detected in New Mobile Devices
Cybersecurity researchers from iVerify have revealed widespread new infections of the Pegasus spyware, developed by NSO Group (dubbed "Rainbow Ronin"), showing that spyware targets not only activists and journalists but also professionals and civilians.
The...
Dell Power Manager Vulnerability Let Attackers Execute Malicious Code
A critical security vulnerability has been discovered in Dell Power Manager (DPM), a widely used application for managing power settings on Dell systems.
The flaw, identified as CVE-2024-49600, allows attackers with low privileges and...
WhatsApp View Once Vulnerability Let Attackers Bypass The Privacy Feature
Meta’s WhatsApp recently faced scrutiny after a significant vulnerability in its "View Once" feature was discovered, allowing attackers to bypass its privacy protections.
This feature, designed to let users send media that can only...
SAP NetWeaver Vulnerabilities Let Attackers Upload Malicious PDF Files
SAP has issued a crucial security update addressing multiple high-severity vulnerabilities in its NetWeaver Application Server for Java, specifically within the Adobe Document Services component.
The patch, released on December 10, 2024, as part...
Microsoft Office & Excel Vulnerabilities Expose Systems To RCE & Privilege Escalation
Microsoft disclosed two significant vulnerabilities affecting its Office and Excel products as part of its December Patch Tuesday updates.
These vulnerabilities tracked as CVE-2024-49059 and CVE-2024-49069, pose serious security risks by enabling attackers to execute...
Critical Dell Product Vulnerabilities Let Attackers Compromise Affected Systems
Dell has recently disclosed two critical security vulnerabilities affecting a wide range of its products, potentially exposing numerous systems to serious risks.
The vulnerabilities, identified as CVE-2024-37143 and CVE-2024-37144, impact various versions of Dell PowerFlex...
New Apache Tomcat Vulnerabilities Let Attackers Execute Remote Code
Two critical vulnerabilities have been discovered in Apache Tomcat, the popular open-source web server, and servlet container, potentially allowing attackers to execute remote code and cause a denial of service.
The Apache Software Foundation has...
Multiple GStreamer Vulnerabilities Impact Linux Distributions Using GNOME
A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux distributions.
According to reports, vulnerabilities, spanning critical issues such as out-of-bounds writes, stack-buffer overflows,...
Critical Chrome Vulnerabilities Let Attackers Execute Remote Code – Update Now
Google has released a significant update for its Chrome browser, addressing multiple high-severity vulnerabilities that could potentially allow unauthorized memory access and other exploits.
The Stable channel has been updated to version 131.0.6778.204/.205 for Windows...
BeyondTrust Remote Access & Support Flaw Enables Command Injection Attacks
BeyondTrust has disclosed a severe security vulnerability in its Privileged Remote Access (PRA) and Remote Support (RS) products that could allow attackers to execute unauthorized system commands.
The vulnerability, tracked as CVE-2024-12356 with a...