Vulnerability
Palo Alto ZeroDay Exploited in The Wild Following PoC Release
Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified as CVE-2024-3400.This zero-day flaw, found in the GlobalProtect Gateway, is...
CVE/vulnerability
FGVulDet – New Vulnerability Detector to Analyze Source Code
Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent vulnerabilities. Prior studies often oversimplify the problem into binary classification tasks,...
cyber security
Pentagon Releases Cybersecurity Strategy To Strengthen Defense Industrial BaseÂ
The DoD DIB Cybersecurity Strategy is a three-year plan (FY24-27) to improve cybersecurity for defense contractors that aims to create a secure and resilient...
Cyber Security News
BunnyLoader 3.0 Detected With Advanced Keylogging Capabilities
BunnyLoader is a rapidly developing malware that can steal information, credentials, and cryptocurrencies while also delivering new malware to its victims.Since its first detection in...
Cisco
SSO Implementation Flaw In Cisco Broadworks Let Attackers Forge Credentials
A single sign-on (SSO) implementation flaw in the Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform might make it possible for...
Cyber Security News
Multiple ArubaOS vulnerabilities Let Attackers Execute Arbitrary Code
Multiple vulnerabilities have been discovered in Aruba 9200 and 9000 Series Controllers and Gateways running ArubaOS. The vulnerabilities related to Buffer Overflow and Hardware...
Cyber Security News
PHPFusion Flaw Allows Attackers to Read Critical System Data
On Tuesday, Synopsys addressed High and medium vulnerabilities CVE-2023-2453, and CVE-2023-4480 discovered in PHPFusion by the researchers.PHPFusion is an open-source content management system (CMS)...
Cyber Security News
Multiple IBM Sterling Secure Proxy Vulnerabilities Allow Remote Code Execution
Multiple vulnerabilities have been found in IBM Sterling Secure Proxy, mostly related to Denial of Service and Information Disclosure.It also consisted of a code...