exploits

In a recent alert, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recommends VMware users update or even delete their deployments due to the detection of critical vulnerabilities, exploited justRead More →

Since its massive implementation, Bluetooth has become one of the most popular wireless connection technologies, allowing people to enhance their activities in a fully connected environment. Virtually any device isRead More →

A Wordfence report points to the detection of a wave of attacks against at least 1.6 million WordPress websites. According to the report, hackers are using some 16,000 malicious IPRead More →

VMware security teams confirmed that the vulnerability in vCenter Server tracked as CVE-2021-22005 has already been exploited in the wild in a chained manner with other bugs fixed in theRead More →

Cybersecurity specialists report the detection of a severe vulnerability in WooCommerce and Multi Currency, two popular WordPress plugins. According to the report, successful exploitation of the vulnerability would allow threatRead More →

Cybersecurity specialists report the detection of a critical vulnerability in OWASP ModSecurity Core Rule Set (CRS), whose exploitation would allow threat actors to bypass security mechanisms in affected deployments, includingRead More →