Wednesday, December 6, 2023
Home Search

vulnerabilities - search results

If you're not happy with the results, please do another search

North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains

The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques involving different...

117 Vulnerabilities Discovered in Microsoft 365 Apps

Microsoft 365 Apps is a suite of productivity tools that includes the following apps and services offered by Microsoft through a subscription service:-Microsoft TeamsOneDriveSharePointPowerPointOutlookWordExcelMicrosoft...

Critical AI Tool Vulnerabilities Let Attackers Execute Arbitrary Code

Multiple critical flaws in the infrastructure supporting AI models have been uncovered by researchers, which raise the risk of server takeover, theft of sensitive information, model poisoning, and...
Exploits Vulnerabilities Dark Web

Hackers Selling Exploits for Critical Vulnerabilities on the Dark Web

Dark forums and Telegram channels have become great places for threat actors to sell critical vulnerabilities and exploits.These vulnerabilities and exploits were associated...

Hackers Actively Exploiting Big-IP and Citrix Vulnerabilities

Experts issued security alerts concerning the ongoing exploitation of Big-IP (CVE-2023-46747, CVE-2023-46748) and Citrix (CVE-2023-4966) vulnerabilities.The publicly available Proof of Concepts (POCs) for these...

Android Security Updates: 2023 – 37 Vulnerabilities Patched Including RCE, DOS

Android has fixed 37 vulnerabilities that were impacting its devices with the release of its November 2023 security updates. Most of the flaws included...

Top 5 Kubernetes Vulnerabilities – 2023

Kubernetes is a popular open-source platform for managing containerized workloads and services. It's a system that simplifies a wide array of deployment, scaling, and...

The Risk of RBAC Vulnerabilities – A Prevention Guide

Role-Based Access Control (RBAC) is a security paradigm focused on assigning system access to users based on their organizational role. It's a sophisticated approach...

MGM Resorts Cybersecurity Issue: A Review of Potential Vulnerabilities in the Hospitality Industry 

The hospitality industry is increasingly under the microscope due to rising cybersecurity concerns. The MGM Resorts data breach in 2023 stands as a stark...
SonicWall Vulnerabilities

Multiple SonicWall Vulnerabilities Resulted in a Firewall Crash

Multiple vulnerabilities were detected in the SonicOS Management web interface and the SSLVPN portal, resulting in a firewall crash.In a security alert that was...

Managed WAF protection


Recent Articles