Wednesday, December 6, 2023
Home Search

vulnerabilities - search results

If you're not happy with the results, please do another search

North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains

0
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques involving different...

117 Vulnerabilities Discovered in Microsoft 365 Apps

0
Microsoft 365 Apps is a suite of productivity tools that includes the following apps and services offered by Microsoft through a subscription service:-Microsoft TeamsOneDriveSharePointPowerPointOutlookWordExcelMicrosoft...

Critical AI Tool Vulnerabilities Let Attackers Execute Arbitrary Code

0
Multiple critical flaws in the infrastructure supporting AI models have been uncovered by researchers, which raise the risk of server takeover, theft of sensitive information, model poisoning, and...
Exploits Vulnerabilities Dark Web

Hackers Selling Exploits for Critical Vulnerabilities on the Dark Web

0
Dark forums and Telegram channels have become great places for threat actors to sell critical vulnerabilities and exploits.These vulnerabilities and exploits were associated...

Hackers Actively Exploiting Big-IP and Citrix Vulnerabilities

0
Experts issued security alerts concerning the ongoing exploitation of Big-IP (CVE-2023-46747, CVE-2023-46748) and Citrix (CVE-2023-4966) vulnerabilities.The publicly available Proof of Concepts (POCs) for these...

Android Security Updates: 2023 – 37 Vulnerabilities Patched Including RCE, DOS

0
Android has fixed 37 vulnerabilities that were impacting its devices with the release of its November 2023 security updates. Most of the flaws included...

Top 5 Kubernetes Vulnerabilities – 2023

0
Kubernetes is a popular open-source platform for managing containerized workloads and services. It's a system that simplifies a wide array of deployment, scaling, and...

The Risk of RBAC Vulnerabilities – A Prevention Guide

0
Role-Based Access Control (RBAC) is a security paradigm focused on assigning system access to users based on their organizational role. It's a sophisticated approach...

MGM Resorts Cybersecurity Issue: A Review of Potential Vulnerabilities in the Hospitality Industry 

0
The hospitality industry is increasingly under the microscope due to rising cybersecurity concerns. The MGM Resorts data breach in 2023 stands as a stark...
SonicWall Vulnerabilities

Multiple SonicWall Vulnerabilities Resulted in a Firewall Crash

0
Multiple vulnerabilities were detected in the SonicOS Management web interface and the SSLVPN portal, resulting in a firewall crash.In a security alert that was...

Managed WAF protection

Website

Recent Articles