"Vulnerability" Related Articles

Log4j Vulnerability Explained
Network Security

Log4j Vulnerability Explained

The Log4j or Log4Shell vulnerability, a cybersecurity flaw on the Apache Log4j 2 Java library, allows an attacker to remotely...
Read The Article →
Cisco and Fortinet Release Security Patches for Multiple Products
Uncategorized

Cisco and Fortinet Release Security Patches for Multiple Products

Cisco on Wednesday rolled out patches for 10 security flaws spanning multiple products, one of which is rated Critical in...
Read The Article →
9 Most Common Network Vulnerabilities
Network Security

10 Most Common Network Vulnerabilities

Today organizations need to be aware of the most common cyber risks threatening their networks. If you're not taking proactive...
Read The Article →
How to Publish a CVE Vulnerability
Best Practices

How to Publish a CVE Vulnerability

A computer security vulnerability is a weakness that can be exploited by a hacker. These weaknesses can be found in...
Read The Article →
Atlassian fixes critical Jira authentication bypass vulnerability
Uncategorized

Atlassian fixes critical Jira authentication bypass vulnerability

Atlassian has published a security advisory to alert that its Jira and Jira Service Management products are affected by a...
Read The Article →
Critical Sophos Firewall RCE Vulnerability Under Active Exploitation
Network Security

Critical Sophos Firewall RCE Vulnerability Under Active Exploitation

Cybersecurity firm Sophos on Monday warned that a recently patched critical security vulnerability in its firewall product is being actively...
Read The Article →
New Security Vulnerability Affects Thousands of Self-Managed GitLab Instances
Uncategorized

New Security Vulnerability Affects Thousands of Self-Managed GitLab Instances

Researchers have disclosed details of a now-patched security vulnerability in GitLab, an open-source DevOps software, that could potentially allow a...
Read The Article →
VMWare fixes holes that could allow virtual machine escapes
Uncategorized

VMWare fixes holes that could allow virtual machine escapes

Acting now will almost certainly jump you ahead of the many inquisitive cybercriminals out there, given that none of the...
Read The Article →
Uncategorized

53% of medical devices have a known critical vulnerability

After a year of unprecedented ransomware attacks on hospitals and healthcare systems - and with healthcare now the #1 target...
Read The Article →
Uncategorized

CISA, FBI and NSA Publish Joint Advisory and Scanner for Log4j Vulnerabilities

Cybersecurity agencies from Australia, Canada, New Zealand, the U.S., and the U.K. on Wednesday released a joint advisory in response...
Read The Article →
Uncategorized

CISA Warns of Actively Exploited Critical Zoho ManageEngine ServiceDesk Vulnerability

The U.S. Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency are warning of active exploitation of a...
Read The Article →
Uncategorized

U.S. Federal Agencies Ordered to Patch Hundreds of Actively Exploited Flaws

The U.S. Cybersecurity and Infrastructure Security Agency has published a catalog of vulnerabilities, including from Apple, Cisco, Microsoft, and Google,...
Read The Article →
Scroll to Top

BOOK A MEETING

Enter Your
Corporate Email

This site is registered on wpml.org as a development site.