CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog

3 years ago

US CISA added actively exploited vulnerabilities in SugarCRM and Oracle products to its Known Exploited Vulnerabilities Catalog. The Cybersecurity and…

GoAnywhere MFT zero-day flaw actively exploited

3 years ago

Threat actors are actively exploiting a zero-day vulnerability affecting Fortra's GoAnywhere MFT managed file transfer application. Experts warn that threat…

CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers

3 years ago

A new wave of ransomware attacks is targeting VMware ESXi servers to deliver ransomware, CERT of France warns. The French…

Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack

3 years ago

The Tallahassee Memorial HealthCare (TMH) hospital in Florida was forced to take offline its systems after a cyberattack. The Tallahassee…

Exploitation attempts for Oracle E-Business Suite flaw observed after PoC release

3 years ago

Threat actors started exploiting a critical Oracle E-Business Suite flaw, tracked as CVE-2022-21587, shortly after a PoC was published. Shadowserver…

VMware Workstation update fixes an arbitrary file deletion bug

3 years ago

VMware addressed a high-severity privilege escalation vulnerability, tracked as CVE-2023-20854, in VMware Workstation. VMware fixed a high-severity privilege escalation flaw,…

Atlassian fixed critical authentication vulnerability in Jira Software

3 years ago

Atlassian fixed a critical flaw in Jira Service Management Server and Data Center that can allow an attacker to impersonate…

Russia-linked Gamaredon APT targets Ukrainian authorities with new malware

3 years ago

Russia-linked threat actor Gamaredon employed new spyware in cyber attacks aimed at public authorities and critical information infrastructure in Ukraine. The…

Cisco fixed command injection bug in IOx Application Hosting Environment

3 years ago

Cisco fixed a high-severity flaw in the IOx application hosting environment that can be exploited in command injection attacks. Cisco…

API management (APIM): What It Is and Where It’s Going

3 years ago

Analyzing the concept of API management (APIM), its benefits, and what it will look like as the API landscape continues…

This website uses cookies.