Home Search
vulnerabilities - search results
If you're not happy with the results, please do another search
North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques involving different...
117 Vulnerabilities Discovered in Microsoft 365 Apps
Microsoft 365 Apps is a suite of productivity tools that includes the following apps and services offered by Microsoft through a subscription service:-Microsoft TeamsOneDriveSharePointPowerPointOutlookWordExcelMicrosoft...
Critical AI Tool Vulnerabilities Let Attackers Execute Arbitrary Code
Multiple critical flaws in the infrastructure supporting AI models have been uncovered by researchers, which raise the risk of server takeover, theft of sensitive information, model poisoning, and...
Hackers Selling Exploits for Critical Vulnerabilities on the Dark Web
Dark forums and Telegram channels have become great places for threat actors to sell critical vulnerabilities and exploits.These vulnerabilities and exploits were associated...
Hackers Actively Exploiting Big-IP and Citrix Vulnerabilities
Experts issued security alerts concerning the ongoing exploitation of Big-IP (CVE-2023-46747, CVE-2023-46748) and Citrix (CVE-2023-4966) vulnerabilities.The publicly available Proof of Concepts (POCs) for these...
Android Security Updates: 2023 – 37 Vulnerabilities Patched Including RCE, DOS
Android has fixed 37 vulnerabilities that were impacting its devices with the release of its November 2023 security updates. Most of the flaws included...
Top 5 Kubernetes Vulnerabilities – 2023
Kubernetes is a popular open-source platform for managing containerized workloads and services. It's a system that simplifies a wide array of deployment, scaling, and...
The Risk of RBAC Vulnerabilities – A Prevention Guide
Role-Based Access Control (RBAC) is a security paradigm focused on assigning system access to users based on their organizational role. It's a sophisticated approach...
MGM Resorts Cybersecurity Issue: A Review of Potential Vulnerabilities in the Hospitality Industry
The hospitality industry is increasingly under the microscope due to rising cybersecurity concerns. The MGM Resorts data breach in 2023 stands as a stark...
Multiple SonicWall Vulnerabilities Resulted in a Firewall Crash
Multiple vulnerabilities were detected in the SonicOS Management web interface and the SSLVPN portal, resulting in a firewall crash.In a security alert that was...