Cyber Security News
Cisco Warns Of Massive Brute-Force Attacks Targeting VPNs & SSH Services
Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or get into systems without permission. By systematically trying various combinations of...
Cyber Attack
Iran Launched A Major Cyberattack Against Critical Infrastructure In Israel
Over the weekend, Iran launched missile and drone attacks on Israel, retaliating for a suspected Israeli strike on its Damascus consulate that killed 13...
CVE/vulnerability
6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers
The software supply chain is filled with various challenges, such as untracked security vulnerabilities in open-source components and inconsistent update uptake. The lighttpd vulnerability was...
CVE/vulnerability
Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable To RCE Attacks
In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant vulnerabilities in its VPN...
CVE/vulnerability
Cisco IOS Vulnerability Allows DOS Attacks via Malicious Traffic
Cisco recently fixed a high-severity vulnerability in Cisco IOS Software for Catalyst 6000 Series Switches, which could lead to a denial of service (DoS).This high-severity vulnerability,...
CVE/vulnerability
Critical Progress Flowmon Vulnerability Let Attackers Inject Malicious Code
A new critical vulnerability has been discovered in Progress Flowmon, assigned with CVE-2024-2389.Progress Flowmon is a Cloud Application Performance monitoring solution that can help...
CVE/vulnerability
Multiple Ivanti Connect Secure Flaw Let Attackers Execute Remote Code
Four new vulnerabilities have been discovered in the Ivanti Connect Secure and Policy Secure Gateways. These vulnerabilities were associated with Heap overflow, null pointer...
cyber security
NSA Details Seven Pillars Of Zero Trust
The National Security Agency (NSA) issued a Cybersecurity Information Sheet (CSI) that discusses limiting adversary lateral movement within an organization's network to access sensitive data...