AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds
AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

2024-11-06 22:18

AI-enhanced malicious attacks are a top concern for 80% of executives, and for good reason, as...

Increasing Awareness of DNS Hijacking: A Growing Cyber Threat

Increasing Awareness of DNS Hijacking: A Growing Cyber Threat

2024-11-06 21:56

Read more about DNS hijacking and how organizations can prevent it.

Cybercrooks are targeting Bengal cat lovers in Australia for some reason

Cybercrooks are targeting Bengal cat lovers in Australia for some reason

2024-11-06 21:47

In case today’s news cycle wasn’t shocking enough, here’s a gem from Sophos Fresh from a series...

Hackers increasingly use Winos4.0 post-exploitation kit in attacks

Hackers increasingly use Winos4.0 post-exploitation kit in attacks

2024-11-06 21:25

Hackers are increasingly targeting Windows users with the malicious Winos4.0 framework,...

Microsoft Notepad to get AI-powered rewriting tool on Windows 11

Microsoft Notepad to get AI-powered rewriting tool on Windows 11

2024-11-06 20:53

Microsoft has started testing AI-powered Notepad text rewriting and Paint image generation tools...

Cisco bug lets hackers run commands as root on UWRB access points

Cisco bug lets hackers run commands as root on UWRB access points

2024-11-06 19:34

Cisco has fixed a maximum severity vulnerability that allows attackers to run commands with root...

New SteelFox malware hijacks Windows PCs using vulnerable driver

New SteelFox malware hijacks Windows PCs using vulnerable driver

2024-11-06 17:53

A new malicious package called 'SteelFox' mines for cryptocurrency and steals credit...

Vulnerabilities by Risk level (Last 12 months)

Risk level Last 12 months #
Critical 2977
High 7607
Medium 9916
Low 334

Vulnerabilities by Vendor (Last 12 months)

Vendor Last 12 months #
Linux 1549
Microsoft 772
Adobe 673
Google 554
Apple 377

Latest Vulnerabilities

  • CVE-2024-10028

    7.5

    The Everest Backup – WordPress Cloud Backup, Migration, Restore & Cloning Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.13...

    network
    low complexity
    CWE-922
  • CVE-2024-10084

    4.3

    The Contact Form 7 – Dynamic Text Extension plugin for WordPress is vulnerable to Basic Information Disclosure in all versions up to, and including, 4.5 via the CF7_get_post_var shortcode. This...

    network
    low complexity
    CWE-200
  • CVE-2024-49522

    7.8

    Substance3D - Painter versions 10.0.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user....

    local
    low complexity
    CWE-787
  • CVE-2024-10329

    4.3

    The Ultimate Bootstrap Elements for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.6 via the 'ube_get_page_templates'...

    network
    low complexity
    CWE-200
  • CVE-2024-10263

    7.3

    The Tickera – WordPress Event Ticketing plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.5.4.4. This is due to the software allowing...

    network
    low complexity
    CWE-94

Latest Critical Vulnerabilities