News and articles Through the necessary security strategies and tools combating cyber threats. Show allArticlesNews“NotLockBit” — A New Ransomware Targeting Windows and macOS SystemsDecember 20, 2024NewsRead MoreHackers Actively Exploiting Vulnerability in FortiClient EMSDecember 20, 2024NewsRead MoreGitHub Launches “Copilot Free” Service for All DevelopersDecember 19, 2024NewsRead MoreCritical Vulnerabilities in Google Chrome Allow Remote Code ExecutionDecember 19, 2024NewsRead MoreVulnerabilities in Fortinet Allow Remote Execution of Malicious CodeDecember 19, 2024NewsRead MoreFBI Warns: HiatusRAT Targets Webcams and DVR DevicesDecember 18, 2024NewsRead MoreNew Vulnerabilities in Apache Tomcat Could Enable Remote Code ExecutionDecember 18, 2024NewsRead MoreRCE Vulnerability in Apache Struts Actively ExploitedDecember 18, 2024NewsRead MoreRCE Vulnerability in WordPress ‘WPML’ Plugin Threatens Over 1 Million WebsitesDecember 17, 2024NewsRead MoreKali Linux 2024.4 Released With New Hacking ToolsDecember 17, 2024NewsRead MoreCoinLurker: Next-Generation Tool Used in Modern CyberattacksDecember 17, 2024NewsRead MoreHackers Exploiting Microsoft Teams for Remote Access to SystemsDecember 16, 2024NewsRead MoreJShielder — A Tool to Enhance Linux Server SecurityDecember 16, 2024ArticlesRead MoreNetwork security analysisDecember 16, 2024ArticlesRead MoreIncreased Scanning of RDP Services: Focus on Port 1098December 14, 2024NewsRead MoreVulnerability in Splunk Secure Gateway App Allows Remote Code ExecutionDecember 12, 2024NewsRead MoreSecurity Vulnerability Discovered in Apache StrutsDecember 12, 2024NewsRead MoreGoogle Releases Security Update for Chrome, Fixing Three High-Severity VulnerabilitiesDecember 11, 2024NewsRead MoreCritical Vulnerability in Windows CLFS Driver: CVE-2024-49138December 11, 2024NewsRead MoreCritical Vulnerabilities in SAP NetWeaverDecember 10, 2024NewsRead MoreWarning About WordPress Security Vulnerability!December 6, 2024NewsRead MoreVAST: An Open Platform for Big Data Analysis and SecurityDecember 5, 2024ArticlesRead MorePersistenceSniper: A Tool for Tracing Hacker Activity in Windows SystemsDecember 5, 2024ArticlesRead MoreRCE Vulnerability in Veeam Service Provider Allows Attackers to Execute Arbitrary CodeDecember 4, 2024NewsRead MoreSurge in Cyberattacks on Cisco’s VPN SystemDecember 3, 2024NewsRead MoreCritical Vulnerabilities Discovered in IBM Security Verify AccessDecember 2, 2024NewsRead MoreVulnerability in Active Directory Certificate Services Allows Attackers to Escalate PrivilegesNovember 29, 2024NewsRead MoreSQL Injection in Zabbix Allows Complete System TakeoverNovember 28, 2024NewsRead MoreVulnerability discovered in NVIDIA UFM systems allows unauthorized access to the systemNovember 27, 2024NewsRead MoreWordPress Plugin Vulnerability Puts 200,000 Sites at RiskNovember 26, 2024NewsRead MoreMITRE Updates the Top 25 Most Dangerous Software Vulnerabilities ListNovember 25, 2024ArticlesRead MoreRemote code execution vulnerabilities discovered in Veritas Enterprise VaultNovember 22, 2024NewsRead MoreDecade-Old Vulnerabilities in Ubuntu Server Allow Attackers to Gain Root AccessNovember 21, 2024NewsRead MoreCritical Vulnerability in Drupal CoreNovember 21, 2024NewsRead MoreCritical Vulnerability Found in Oracle’s “Agile PLM” FrameworkNovember 20, 2024NewsRead MoreMultiple Critical Vulnerabilities Identified in Apache TomcatNovember 20, 2024NewsRead MoreCritical Vulnerability Discovered in Samba Active Directory (AD) SystemNovember 19, 2024NewsRead MoreVMware vCenter Server Vulnerabilities Actively Exploited in AttacksNovember 19, 2024NewsRead MorePostgreSQL Releases Security Update for Multiple VulnerabilitiesNovember 18, 2024NewsRead MoreA recently discovered vulnerability in Apache HertzBeat could pose a threat to the security of user dataNovember 18, 2024NewsRead MoreTop 5 Best Network Traffic Analysis Tools of 2024November 15, 2024ArticlesRead MoreCritical vulnerability discovered in GitHub CLI allows attackers to execute malicious commandsNovember 15, 2024NewsRead MoreA critical vulnerability discovered in the Laravel framework opens the door for hackers to gain unauthorized access.November 15, 2024NewsRead MoreVulnerability in WordPress plugin puts over 4 million websites at riskNovember 15, 2024NewsRead MoreHackers are attacking GitHub users using a sophisticated new Phishing tool called “GoIssue”November 13, 2024NewsRead MoreHigh-Level Vulnerabilities Identified in Fortinet ProductsNovember 13, 2024NewsRead MoreForecast of Major Cyber Threats in Uzbekistan for 2025November 13, 2024ArticlesRead MoreSAP Security Update: Patch for High Severity VulnerabilitiesNovember 12, 2024NewsRead MoreHackers Exploiting Veeam RCE Vulnerability to Deploy New “Frag” RansomwareNovember 11, 2024NewsRead MoreCritical Vulnerabilities Found in WSO2 ProductsNovember 11, 2024NewsRead MoreCritical Vulnerability in D-Link NAS DevicesNovember 11, 2024NewsRead MoreCritical Vulnerability Discovered in Apache ZooKeeperNovember 8, 2024NewsRead MoreCritical Vulnerability Discovered in DrupalNovember 7, 2024NewsRead MoreHigh-Severity Vulnerability Identified in Veeam Backup Enterprise ManagerNovember 7, 2024NewsRead MoreHigh-Level Vulnerabilities Found in Cisco ProductsNovember 6, 2024NewsRead MoreQNAP QuRouter: Critical Vulnerability DiscoveredNovember 5, 2024NewsRead MoreBotnets: Hidden ThreatsNovember 5, 2024ArticlesRead MoreVPN Vulnerability in Cisco ASA and FTD Systems Hackersis being actively used in cyber attacksOctober 24, 2024NewsRead MoreA high-level vulnerability has been discovered in Fortinet’s FortiManager productOctober 24, 2024NewsRead MoreCallback Phishing Attacks: Stealing Login Credentials Through Google GroupsOctober 23, 2024NewsRead MoreThe top 5 most common vulnerabilities in the “UZ” national segment over the past 3 monthsData identified by the UZCERT service in the third quarter of this yearOctober 11, 2024ArticlesRead MoreHigh-level vulnerability discovered in ZimbraOctober 3, 2024NewsRead MoreCUPS (Common UNIX Printing System) vulnerabilities and their security implicationsOctober 1, 2024NewsRead MoreSQL Injection vulnerability in WordPress’s “The Events Calendar” PluginSeptember 27, 2024News,UncategorizedRead MoreDoS (Denial of Service) Vulnerability Found in Apache TomcatSeptember 24, 2024NewsRead MoreA new Android malware called “Ajina.Banker” is attacking users via Telegram to steal banking credentials.September 18, 2024NewsRead MoreUzbekistan strengthened its position in the Global Cyber Security Index.September 13, 2024NewsRead MoreOn October 10, 2024, in the frame of the republican competition “KIBERKENT 2.0”, the seminar “MASTERSKAY” will be held.September 12, 2024NewsRead MoreKibana vulnerabilities could allow attackers to remotely execute arbitrary codeSeptember 9, 2024NewsRead MoreVulnerabilities in Veeam software could allow attackers to execute code remotelySeptember 8, 2024NewsRead MoreA high-level vulnerability has been discovered in the WordPress LiteSpeed Cache pluginSeptember 6, 2024NewsRead MoreEvery teenager should know and remember these simple rules.August 28, 2024ArticlesRead More⚠️ Vulnerability Found in GiveWP WordPress Plugin Puts Over 100,000 Websites at RiskAugust 23, 2024NewsRead MoreCYBERKENT 2.0. Cyber Security Summit – Central Eurasia, CSS 2024August 23, 2024NewsRead MoreA discovered vulnerability in Cisco Software Manager could allow hackers to change passwordsAugust 21, 2024NewsRead MoreAn XSS vulnerability discovered in Zimbra could allow hackers to remotely execute malicious JavaScript codeAugust 21, 2024NewsRead MoreVulnerabilities in Cisco VPN routers allow attackers to execute remote codeJuly 30, 2024NewsRead MoreGitLab’ discovered a high-profile vulnerability that could allow remote code executionJuly 30, 2024NewsRead MoreThe RADIUS protocol vulnerability affected several Cisco productsJuly 30, 2024NewsRead MoreNo post found +99871 203 00 23 info@uzcert.uzFor a cyber incident: incident@uzcert.uz 20 Taras Shevchenko Street, Mirabad District, Tashkent City About Services News