9 C
Munich
Saturday, May 4, 2024
- Advertisement -

TAG

Vulnerability

Most Organizations Still Vulnerable To The Log4j Vulnerability

A study examining the scope and impact of the recent Log4j vulnerability has been conducted by Tenable and the results are extremely interesting. According to...

“OK Google”, Patch A New Zero-Day Vulnerability

Yet another Chrome "zero-day" vulnerability was patched by Google, the 8th for 2022. The tech giant released security updates to address a new zero-day vulnerability...

Google Pixel Phone Lock Bypass

Security researcher David Schütz, discovered a vulnerability that could allow an attacker to unlock any Google Pixel phone without knowing its passcode! This finding...

CSRF Vulnerability Discovered in Plesk API

Plesk is a very popular administration tool for web hosting and data center providers. Users usually use its web interface to administer their websites...

Critical Vulnerabilities Affecting Citrix Gateway and ADC

Critical vulnerabilities have been discovered in Citrix Gateway and Citrix ADC which can allow an attacker to gain unauthorized access, perform remote desktop takeover...

Public Exploit is Available for NSX-V, VMware Urges Customers to Upgrade

The critical vulnerability for NSX Data Center for vSphere(NSX-V) tracked as CVE-2021-39144 can be exploited to provide remote code execution to attackers. Public exploit is...

Cybercrime: Face the Facts

We need to face some hard facts, to move forward. Fact #1: cybercrime is here to stay It has been around for many decades, but in...

Apple patches its ninth vulnerability for this year

Since the start of 2022, Apple has addressed nine vulnerabilities with the latest one affecting iOS and iPadOS. This Monday, Apple rolled out updates to...

How to Detect and Fix the “Text4Shell” Vulnerability

What is Text4Shell Similar to the Spring4Shell and Log4Shell vulnerabilities, Text4Shell is a new vulnerability reporter by Alvaro Munoz, in the Apache Commons Text library....

Flaws in Legacy Systems, BYOD and Remote Access: How they Impact Operations Security of the Enterprise

Many information security threats stem from vulnerabilities presented by outdated workstations, network devices, and mobile devices such as tablets and smartphones. These objects are...

Latest news

- Advertisement -