CVE/vulnerability
Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable To RCE Attacks
In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant vulnerabilities in its VPN...
CVE/vulnerability
Cisco IOS Vulnerability Allows DOS Attacks via Malicious Traffic
Cisco recently fixed a high-severity vulnerability in Cisco IOS Software for Catalyst 6000 Series Switches, which could lead to a denial of service (DoS).This high-severity vulnerability,...
CVE/vulnerability
Critical Progress Flowmon Vulnerability Let Attackers Inject Malicious Code
A new critical vulnerability has been discovered in Progress Flowmon, assigned with CVE-2024-2389.Progress Flowmon is a Cloud Application Performance monitoring solution that can help...
CVE/vulnerability
Multiple Ivanti Connect Secure Flaw Let Attackers Execute Remote Code
Four new vulnerabilities have been discovered in the Ivanti Connect Secure and Policy Secure Gateways. These vulnerabilities were associated with Heap overflow, null pointer...
cyber security
NSA Details Seven Pillars Of Zero Trust
The National Security Agency (NSA) issued a Cybersecurity Information Sheet (CSI) that discusses limiting adversary lateral movement within an organization's network to access sensitive data...
CVE/vulnerability
Zyxel Firewall Flaw Let Attackers Execute Remote Code
Four new vulnerabilities have been discovered in some of the Zyxel Firewall and access point (AP) versions that are associated with Denial of Service,...
Cyber Security News
Wireshark 4.2.3 Released – What’s New!
Wireshark is backed by the nonprofit Wireshark Foundation, which relies on your support to advance protocol analysis education.However, Wireshark 4.2.3 is out now, and...
cyber security
ZTNA vs VPN: What is the Difference? Will ZTNA Replace VPN?
In the late 1990s, VPN technology revolutionized remote work. However, the traditional VPN model has become outdated and unworkable as the world becomes increasingly...