Advancing as a cybersecurity ally
We speak with Anirudh Chand, Head of Solutions Engineering, APJ at Fortra. Anirudh has worked in cyber security for the...
We speak with Anirudh Chand, Head of Solutions Engineering, APJ at Fortra. Anirudh has worked in cyber security for the...
Newly discovered vulnerabilities in distributed control systems could allow attackers access to systems supporting industrial, energy, chemical and other operations....
With this month's Patch Tuesday update, Microsoft addressed 130 security vulnerabilities, published two advisories, and included four major CVE revisions....
Jul 14, 2023THNVulnerability/ Cyber Threat Multiple security vulnerabilities have been discovered in various services, including Honeywell Experion distributed control system...
SonicWall fixed multiple critical vulnerabilities impacting its GMS firewall management and Analytics management and reporting engine. SonicWall addressed multiple critical...
Zero-day exploits — or 0days, in hacker-speak — allow attackers to quietly access a network or software. Due to their...
Progress Software late last week shipped fixes for further vulnerabilities in its MOVEit Transfer software, with the US Cyber and...
Google released July security updates for Android that addressed tens of vulnerabilities, including three actively exploited flaws. July security updates...
US CISA added actively exploited Samsung and D-Link vulnerabilities to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security...
SQL injection vulnerabilities in Gentoo Soko could lead to remote code execution (RCE) on impacted systems. SonarSource researchers discovered two...
Jun 28, 2023Ravie LakshmananEndpoint Security / RCE Multiple SQL injection vulnerabilities have been disclosed in Gentoo Soko that could lead...
Organizations face increasingly sophisticated cyber threats and vulnerabilities in today's rapidly evolving digital landscape. Traditional security models can no longer...
The Internet Systems Consortium (ISC) addressed three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The Internet Systems Consortium...
U.S. Cybersecurity and Infrastructure Security Agency (CISA) added six new vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity...
VMware addressed multiple memory corruption vulnerabilities in vCenter Server that can be exploited to achieve remote code execution. VMware released...