A few days ago, a researcher discovered a serious security flaw in Yoast plugin. This…
code execution
-
- Hacking NewsLatest Cyber Security News | Network Security HackingNewsVulnerabilities
IBM Db2 Vulnerabilities Left IBM Database Installations At Risk Of Hacks
IBM patched a couple of serious vulnerabilities in the previous week in their Db2 database…
- Cyber AttackHacking NewsLatest Cyber Security News | Network Security HackingNewsVulnerabilities
Hackers Could Exploit A Zoom App Vulnerability To Disrupt Conferences
The customers of Zoom conferencing app need to update their apps at the earliest to…
- Hacking NewsLatest Cyber Security News | Network Security HackingNewsVulnerabilities
Another Zero-Day Vulnerability Hits NUUO Surveillance Cameras
A couple of months ago, a zero-day vulnerability, named Peekaboo, threatened NUUO surveillance cameras. The…
- Cyber AttackHacking NewsLatest Cyber Security News | Network Security HackingVulnerabilities
VMWare Patched Critical Vulnerability In Workstation And Fusion
Recently, VMware patched critical vulnerability affecting its Workstation and Fusion software. The bug could allegedly…
- Hacking NewsLatest Cyber Security News | Network Security HackingNewsVulnerabilities
Adobe Patched A Critical Flash Player Vulnerability Disclosed Publicly
Adobe Flash Player vulnerabilities and their subsequent patches are no surprise to us. Once again,…
- Hacking NewsLatest Cyber Security News | Network Security HackingNewsVulnerabilities
Unpatched Microsoft Word Video Feature Vulnerability is Being Exploited In The Wild
Last month, researchers from a cybersecurity firm shared their findings on a bug in Microsoft…
- Cyber AttackLatest Cyber Security News | Network Security HackingNewsVulnerabilities
Cisco Patches Multiple Critical Security Flaws Affecting Different Products
Once again, Cisco has addressed multiple security vulnerabilities affecting different Cisco products. As disclosed via…
- Hacking NewsLatest Cyber Security News | Network Security HackingNewsVulnerabilities
BLEEDINGBIT – Two Zero Day Vulnerabilities Affecting Wireless Access Point Bluetooth Chips
Wireless Access Points (WAPs) form the core of enterprise cyber security as they serve as…
- Latest Cyber Security News | Network Security HackingNewsVulnerabilities
Vulnerability In Microsoft Word Online Video Feature Allows for Phishing
Researchers have discovered another way through which bad actors may phish! The method employs exploiting…