Pierluigi Paganini

Juniper Networks addressed many issues in its products

Juniper Networks addressed several vulnerabilities in its firewalls, most of them can be exploited by attackers for denial-of-service (DoS) attacks.…

6 years ago

Researchers found allegedly intentional backdoors in FTTH devices from Chinese vendor C-Data

Two security researchers have found undocumented Telnet admin account accounts in 29 FTTH devices from Chinese vendor C-Data. Two security…

6 years ago

KingComposer fixes a reflected XSS impacting 100,000 WordPress sites

An XSS vulnerability in the KingComposer page builder for WordPress impacts 100,000 websites using the WordPress plugin.  Researchers at Wordfence Threat…

6 years ago

Pre-Installed malware spotted on other Android phones sold in US

Researchers from Malwarebytes have found yet another phone with pre-installed malware via the Lifeline Assistance program sold in the United…

6 years ago

Zoom is working on a patch for a zero-day in Windows client

Researchers from cyber-security firm ACROS Security have disclosed a zero-day vulnerability in the Windows client of the popular Zoom video…

6 years ago

15 billion credentials available in the cybercrime marketplaces

More than 15 billion username and passwords are available on cybercrime marketplaces, including over 5 billion unique credentials, states the…

6 years ago

Palo Alto Networks addresses another high severity issue in PAN-OS devices

Palo Alto Networks addressed a new severe vulnerability in the PAN-OS GlobalProtect portal that impacts PAN next-generation firewalls. Recently Palo…

6 years ago

Google Tsunami vulnerability scanner is now open-source

Google announced that its Tsunami vulnerability scanner for large-scale enterprise networks is going to be open-sourced. Google has decided to…

6 years ago

DOJ indicts Fxmsp hacker for selling access to hacked businesses

The US Department of Justice has indicted a hacker named Fxmsp for hacking over three hundred organizations worldwide and selling…

6 years ago

Threat actors found a way to bypass mitigation F5 BIG-IP CVE-2020-5902 flaw

Researchers have found a way to bypass F5 Networks mitigation for the actively exploited BIG-IP vulnerability, and hackers already used…

6 years ago

This website uses cookies.