Thursday , January 23 2025

Recent Posts

Pwn2Own Contest Tokyo
Hackers Unearths Dozens of Zero-Day Vulnerabilities

Pwn2Own

Top ethical hackers are currently competing in Tokyo. They have discovered nearly 40 zero-day vulnerabilities in Tesla and other products. The first car-focused Zero Day Initiative (ZDI) Pwn2Own contest takes place from January 24-26. ZDI is the world’s largest bug bounty program, encouraging ethical hackers to find and report vulnerabilities …

Read More »

Bulletproof Hosting: A Critical Cybercriminal Service

chart

Cybercriminals now offer services and products to other cybercriminals is a significant development in the last two decades. Cybercrime-as-a-service has made it easier for criminals to get into cybercrime, allowing them to specialize and commit crimes on a larger scale. For instance, instead of coding malware, a criminal can buy …

Read More »

CISA Adds One Known Exploited Vulnerability to Catalog

CISA

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-22527 Atlassian Confluence Data Center and Server Template Injection Vulnerability CVE-2023-22527 Detail: A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE …

Read More »

This will close in 6 seconds