Tuesday, April 23, 2024
Home Search

vulnerabilities - search results

If you're not happy with the results, please do another search

Apex Code Vulnerabilities Let Hackers Steal Salesforce Data

0
Hackers target Apex code vulnerabilities in Salesforce to exploit security weaknesses, gain unauthorized access to sensitive data, or manipulate the system.Apex is a powerful...

Google Chrome 122 Update Addresses Critical Security Vulnerabilities

0
Google has recently unveiled Chrome 122, a significant milestone for the widely used web browser.The most recent release, compatible with Windows, Mac, and Linux...

Splunk Patched Critical Vulnerabilities in Enterprise Security

0
Several vulnerabilities have been discovered in Splunk Enterprise Security and Splunk User Behavior Analytics (UBA), which existed in several third-party packages.The third-party package...

Microsoft’s 2023 Final Patch: 34 Vulnerabilities Including Critical 0-Day Fixed

0
Microsoft has released their patches for December 2023 as part of their Patch Tuesday. In this release, they have patched more than 34 vulnerabilities...
TA422 Hackers Attack Organizations

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

0
Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative targets. Outlook vulnerabilities offer:-Access to sensitive emails Access to sensitive informationWinRAR vulnerabilities...

North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains

0
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques involving different...

117 Vulnerabilities Discovered in Microsoft 365 Apps

0
Microsoft 365 Apps is a suite of productivity tools that includes the following apps and services offered by Microsoft through a subscription service:-Microsoft TeamsOneDriveSharePointPowerPointOutlookWordExcelMicrosoft...

Critical AI Tool Vulnerabilities Let Attackers Execute Arbitrary Code

0
Multiple critical flaws in the infrastructure supporting AI models have been uncovered by researchers, which raise the risk of server takeover, theft of sensitive information, model poisoning, and...
Exploits Vulnerabilities Dark Web

Hackers Selling Exploits for Critical Vulnerabilities on the Dark Web

0
Dark forums and Telegram channels have become great places for threat actors to sell critical vulnerabilities and exploits.These vulnerabilities and exploits were associated...

Hackers Actively Exploiting Big-IP and Citrix Vulnerabilities

0
Experts issued security alerts concerning the ongoing exploitation of Big-IP (CVE-2023-46747, CVE-2023-46748) and Citrix (CVE-2023-4966) vulnerabilities.The publicly available Proof of Concepts (POCs) for these...

Managed WAF protection

Website

Recent Articles