Generative Data Intelligence

Tag: RCE

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections

A previously undocumented hardware feature within Apple's iPhone System on a Chip (SoC) allows for exploitation of multiple vulnerabilities, eventually letting attackers bypass hardware-based...

Google Releases Eighth Zero-Day Patch of 2023 for Chrome

Google has issued an urgent update to address a recently discovered vulnerability in Chrome that has been under active exploitation in the wild, marking...

CertiK Warns OKX Users To Update Their iOS App Now

CertiK has warned users of iOS apps of a security flaw in the OKX app.  CertiK urged iPhone users to immediately update...

Attackers Exploit 6-Year-Old Microsoft Office Bug to Spread Spyware

Attackers are exploiting a 6-year-old Microsoft Office remote code execution (RCE) flaw to deliver spyware, in an email campaign weaponized by malicious Excel attachments...

Attackers Exploit 6-Year-Old Microsoft Office Bug to Spread Spyware

Attackers are exploiting a 6-year-old Microsoft Office remote code execution (RCE) flaw to deliver spyware, in an email campaign weaponized by malicious Excel attachments...

OKX Swiftly Addresses Critical Security Flaw in its iOS App After CertiK’s Warning

Prominent blockchain security company – CertiK – issued a warning to OKX users to update their iOS app to the latest version after...

OKX Wallet Users Urged To Update iOS After Security Firm Issues Alert of Critical Vulnerability – The Daily Hodl

Users of OKX Wallet are being warned by blockchain security firm Certik to update their iOS app. Via a post on the social media platform...

Microsoft Outlook Zero-Click Security Flaws Triggered by Sound File

Researchers this week disclosed details on two security vulnerabilities in Microsoft Outlook that, when chained together, give attackers a way to execute arbitrary code...

Microsoft: Multiple Perforce Server Flaws Allow for Network Takeover

Microsoft has identified four vulnerabilities in the Perforce source-code management platform, the most critical of which gives attackers access to a highly privileged Windows...

Years-Old, Unpatched GWT Vuln Leaves Apps Open to Server-Side RCE

More than eight years after it first came to light, an unauthenticated Java deserialization vulnerability lurking in the Google Web Toolkit open source application...

Patch Now: Exploit Activity Mounts for Dangerous Apache Struts 2 Bug

Concerns are high over a critical, recently disclosed remote code execution (RCE) vulnerability in Apache Struts 2 that attackers have been actively exploiting over...

Global TeamCity Exploitation Opens Door to SolarWinds-Style Nightmare

APT29, the notorious Russian advanced persistent threat behind the 2020 SolarWinds hack, is actively exploiting a critical security vulnerability in JetBrains TeamCity that could...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?