Thousands of Fortinet VPN Credentials Leaked by Hackers
Cybercriminals group “Orange” publicly leaked around 500,000 usernames and passwords of the Fortinet VPN users from as many as 74 different countries. The disclosed credentials are associated with FortiGate SSL-VPN…
Active Zero Day Attack on Microsoft Internet Explorer with Office 365
Microsoft reported an actively exploited Zero-Day Vulnerability affecting their Internet Explorer that will enable attackers for remote code execution in user’s systems. The flaw is found in the MSHTML, the…
Netgear-Critical Authentication Bypass Vulnerability in their Smart Switches
A critical high severity Authentication Bypass Vulnerability was found on the Netgear Smart Switches used on corporate networks. These vulnerable devices can be exploitable by the attacker logging into the…
Common Vulnerabilities and Recommendations Part-6
The article explains about the several common vulnerabilities in web applications and a detailed explanation about their risks, causes and recommendations. Brute Force: A Brute Force Attack occurs when an…
Common Vulnerabilities and Recommendations Part-5
The article explains about the several common vulnerabilities in web applications and a detailed explanation about their risks, causes and recommendations. Cross-Frame Scripting (XFS): Cross-Frame Scripting (XFS) also known as…
Common Vulnerabilities and Recommendations Part-4
The article explains about the several common vulnerabilities in web applications and a detailed explanation about their risks, causes and recommendations. Improper Restriction of XXE Ref: Improper Restriction of XXE…
Common Vulnerabilities and Recommendations Part-3
The article explains about the several common vulnerabilities in web applications and a detailed explanation about their risks, causes and recommendations. Cross-Site Request Forgery (CSRF): Cross-Site Request Forgery (CSRF) vulnerability…
Common Vulnerabilities and Recommendations Part-2
The article explains about the several common vulnerabilities in web applications and a detailed explanation about their risks, causes and recommendations. Remote File Inclusion (RFI): Remote File Inclusion (RFI) vulnerability…
Common Vulnerabilities and Recommendations Part-1
The article explains about the several common vulnerabilities in web applications and a detailed explanation about its risks, causes and recommendations. Buffer Overflow: Buffer Overflow vulnerability occurs when an attacker…
Wipro launches @now Studio, a Cyber Security Center in Texas
Wipro Technologies launched a first-of-its-kind cybersecurity technology center ‘@now Studio’ in Plano, Texas. They developed this center in partnership with California-based ServiceNow, a cloud computing software company. @now Studio focuses…