Security

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Organizations had to re-examine the traditional business perimeter and migrate to cloud-based tools to support distributed workforces. What is the…

2 years ago

<gwmw style="display: none; background-color: transparent;"></gwmw>A high-severity vulnerability affects Cisco Firepower Management Center<gwmw style="display: none; background-color: transparent;"></gwmw>

Cisco addressed a SQL injection vulnerability in the web-based management interface of the Firepower Management Center (FMC) Software.  Cisco addressed…

2 years ago

MITRE December 2023 attack: Threat actors created rogue VMs to evade detection

The MITRE Corporation revealed that threat actors behind the December 2023 attacks created rogue virtual machines (VMs) within its environment.…

2 years ago

An XSS flaw in GitLab allows attackers to take over accounts<gwmw style="display:none;"></gwmw>

GitLab addressed a high-severity cross-site scripting (XSS) vulnerability that allows unauthenticated attackers to take over user accounts. GitLab fixed a high-severity…

2 years ago

CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog

CISA adds Apache Flink improper access control vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security…

2 years ago

Recall feature in Microsoft Copilot+ PCs raises privacy and security concerns

UK data watchdog is investigating Microsoft regarding the new Recall feature in Copilot+ PCs that captures screenshots of the user's…

2 years ago

Critical SQL Injection flaws impact Ivanti Endpoint Manager (EPM)

Ivanti addressed multiple flaws in the Endpoint Manager (EPM), including remote code execution vulnerabilities. Ivanti this week rolled out security…

2 years ago

Critical Veeam Backup Enterprise Manager authentication bypass bug

A critical security vulnerability in Veeam Backup Enterprise Manager could allow threat actors to bypass authentication. A critical vulnerability, tracked…

2 years ago

CISA adds NextGen Healthcare Mirth Connect flaw to its Known Exploited Vulnerabilities catalog <gwmw style="display:none;"></gwmw>

CISA adds NextGen Healthcare Mirth Connect deserialization of untrusted data vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity…

2 years ago

<gwmw style="display: none; background-color: transparent;"></gwmw>Experts released PoC exploit code for RCE in QNAP QTS<gwmw style="display: none; background-color: transparent;"></gwmw>

Experts warn of fifteen vulnerabilities in the QNAP QTS, the operating system for the Taiwanese vendor's NAS products. An audit…

2 years ago

This website uses cookies.