Security

Google addressed 3 actively exploited flaws in Android

Google released July security updates for Android that addressed tens of vulnerabilities, including three actively exploited flaws. July security updates…

3 years ago

Progress warns customers of a new critical flaw in MOVEit Transfer software

Progress released security patches for a new critical SQL injection vulnerability affecting its MOVEit Transfer software. Progress is informing customers…

3 years ago

Cisco warns of a flaw in Nexus 9000 series switches that allows modifying encrypted traffic

Cisco warns of a high-severity vulnerability in Nexus 9000 series switches that can allow attackers to read or modify encrypted…

3 years ago

StackRot, a new Linux Kernel privilege escalation vulnerability

StackRot is s new security vulnerability in the Linux kernel that could be exploited to gain elevated privileges on a target…

3 years ago

Ransomware accounts for 54% of cyber threats in the health sector

The European Union Agency for Cybersecurity (ENISA) releases its first cyber threat landscape report for the health sector. The European…

3 years ago

335,923 out of 489,337 Fortinet firewalls vulnerable to CVE-2023-27997

Researchers reported that there are 490,000 Fortinet firewalls exposing SSL VPN interfaces on the internet, and roughly 69% of them…

3 years ago

The Impacts of Data Loss on Your Organization

What are the causes of Data Loss and which are their impact on your organization? In today's digital age, data…

3 years ago

CISA adds Samsung and D-link bugs to its Known Exploited Vulnerabilities catalog

US CISA added actively exploited Samsung and D-Link vulnerabilities to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security…

3 years ago

Avast released a free decryptor for the Windows version of the Akira ransomware

Avast released a free decryptor for the Akira ransomware that can allow victims to recover their data without paying the…

3 years ago

Critical SQL Injection flaws in Gentoo Soko can lead to Remote Code Execution

SQL injection vulnerabilities in Gentoo Soko could lead to remote code execution (RCE) on impacted systems. SonarSource researchers discovered two…

3 years ago

This website uses cookies.