1 C
Munich
Tuesday, April 23, 2024
- Advertisement -

TAG

Vulnerability

Half of EDR Tools, Organizations Vulnerable to Clop Ransomware, Research Says

In recent assessments conducted by cybersecurity company Cymulate, it was revealed that nearly half of the endpoint detection and response (EDR) tools and organizations...

Chinese Hacking Group Linked to Zero-Day Exploitation of Fortinet FortiOS Security Flaw

Threat intelligence firm Mandiant has attributed the zero-day exploitation of a medium-severity security flaw in the Fortinet FortiOS operating system to a suspected Chinese...

Beware of DoS Attacks on Cisco Routers: Cisco Releases Critical Security Updates

Cisco has released critical security updates to address a high-severity DoS (Denial of Service) vulnerability that affects its IOS XR software. This vulnerability tracked...

Critical Flaw in ClamAV Discovered and Patched

Cisco has issued security updates to address a critical flaw in ClamAV open-source antivirus engine. The flaw, which is tracked as CVE-2023-20032 with a...

Massive Ransomware Campaign Targeting VMware ESXi Servers Worldwide

The Italian National Cybersecurity Agency (ACN) has issued a warning about a large-scale ransomware campaign targeting VMware ESXi servers worldwide, including Italian systems. The...

VMware Fixes High-Severity Privilege Escalation Flaw in Workstation

The Vulnerability Details VMware fixed a high-severity privilege escalation flaw, tracked as CVE-2023-20854, that impacts Workstation. An attacker can exploit the vulnerability to delete arbitrary...

Critical Vulnerability Discovered in Jira Service Management Server and Data Center

A critical security vulnerability has been discovered in Jira Service Management Server and Data Center, which has been assigned the CVE identifier CVE-2023-22501 and...

F5 BIG-IP Vulnerability: A Threat to System Stability

F5 Networks, a cybersecurity company, has issued a warning regarding a high-severity format string vulnerability in BIG-IP. This vulnerability has the potential to cause...

The Colorful Teams of Cybersecurity

You may have heard of terms like "Red", "Blue", even "Purple" when referring to security teams a company employs to test and defend their...

Understand And Reduce Your Attack Surface

The attack surface of your organization can be defined as all the possible entry points an attacker may try to exploit to gain access...

Latest news

- Advertisement -