Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs
Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs New variants of the Eagerbee malware framework are being deployed against government organizations and internet service providers (ISPs) in the Middle East. Previously, the malware was seen in attacks … Read more Published Date: Jan 06, 2025 (18 hours, 46 minutes ago) Vulnerabilities has been mentioned in this […]
CVE-2024-5594 – OpenVPN PATH Injection Vulnerability
The following table lists the changes that have been made to the CVE-2024-5594 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 06, 2025 Action […]
Top Cybersecurity Certifications to Boost Your Career in 2025
Top Cybersecurity Certifications to Boost Your Career in 2025 Cybersecurity professionals are the frontline warriors combating hackers, hacktivists, and ransomware groups. To fight with these cyber criminals, the world needs cybersecurity expertise who can acces … Read more Published Date: Jan 06, 2025 (20 hours, 42 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-43441 CVE-2024-38856 […]
CVE-2024-12970 – TUBITAK BILGEM Pardus OS My Computer OS Command Injection
The following table lists the changes that have been made to the CVE-2024-12970 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 06, 2025 Action […]
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan] Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are t … Read more Published Date: Jan […]
CVE-2024-45559 – Apache GVM Denial of Service
The following table lists the changes that have been made to the CVE-2024-45559 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 06, 2025 Action […]
CVE-2024-45553 – Intel Process Map Insufficient Synchronization Memory Corruption
The following table lists the changes that have been made to the CVE-2024-45553 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 06, 2025 Action […]
CVE-2024-45558 – Microsoft Wi-Fi Wireless Networking Buffer Overflow Vatican Leak
The following table lists the changes that have been made to the CVE-2024-45558 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 06, 2025 Action […]
CVE-2024-45550 – WestBridge MCDM IOCTL Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2024-45550 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 06, 2025 Action […]
CVE-2024-45555 – Citrix Hypervisor Memory Corruption Vulnerability
The following table lists the changes that have been made to the CVE-2024-45555 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics. New CVE Received by [email protected] Jan. 06, 2025 Action […]