GBH
GBH
Home Search

vulnerabilities - search results

If you're not happy with the results, please do another search
Hackers Exploit WebLogic Vulnerabilities

Hackers Exploit WebLogic Vulnerabilities to Deliver Cryptocurrency-Mining Malware

0
In order to deliver cryptocurrency mining malware, the threat actors are actively exploiting both old and newly discovered vulnerabilities in Oracle WebLogic Server. Recent research...
Lenovo BIOS Vulnerabilities

Lenovo Several High-Severity BIOS Vulnerabilities Impacts Hundreds of Devices

0
Recently, Lenovo’s new BIOS updates fixes the high-severity vulnerabilities impacting hundreds of devices in several models (Desktop, All in One, IdeaCentre, Legion, ThinkCentre, ThinkPad,...
Researchers Vulnerabilitiy Software

Researchers Found Series of Vulnerabilities in the Software Underlying Microsoft Teams & Other Apps

0
Security researchers discovered a series of vulnerabilities in the software underlying popular apps like Discord, Microsoft Teams, Spotify, and many others. Reports say the group...
Open Redirect Vulnerabilities

Hackers Use Open Redirect Vulnerabilities in Online Services to Deliver Phishing Content

0
Researchers at Resecurity noticed threat actors leveraging Open Redirect Vulnerabilities which is popular in online services and apps to evade spam filters to deliver...
Multiple Vulnerabilities on VMware

Multiple Vulnerabilities on VMware Let Attackers Gain Admin Privileges

0
VMware recently issued an advisory warning for the administrators that multiple products on the VMware Cloud Platform are affected by multiple flaws, and among...
Open Automation Software Platform

Vulnerabilities in Open Automation Software Platform Let Attackers Execute Remote Code

0
Jared Rittle of Cisco Talos discovered several critical and high-severity vulnerabilities in the Open Automation Software Platform that allow attackers to execute remote code. The...
A New Linux-based Botnet Targeting Vulnerabilities in Web Servers & Android Servers

A New Linux-based Botnet Targeting Vulnerabilities in Web Servers & Android Servers

0
Currently, a new botnet extends its reach with the help of code originating from various pieces of malware. The company is doing so by...
Million Times Downloaded Android Apps Exposed to High-severity Vulnerabilities

Million Times Downloaded Android Apps Exposed to High-severity Vulnerabilities

0
A framework used by Android apps has been found to have high severity flaws by Microsoft security researchers. Multiple large mobile service providers across...
Oxeye Contextualizes Cloud Native Application Risk Assessment — Investigates Application-Level Vulnerabilities

Oxeye Contextualizes Cloud Native Application Risk Assessment — Investigates Application-Level Vulnerabilities

0
Oxeye has announced the availability of its Cloud Native Application Security Testing (CNAST) platform. The application security platform identifies custom code and open-source vulnerabilities,...
Tarrask Malware Uses Unpatched Zero-day

Tarrask Malware Uses Unpatched Zero-day Vulnerabilities to Evade Defense Techniques

0
The Chinese-backed Hafnium hacking group has been found to use a new type of malware that Microsoft discovered a few days ago.  This malware has...

Penetration Testing as a Service

Website

Complete Free Website Security Check

Website

Recent Posts