Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
1509 Results
Vulnerabilities in MOVEit Gateway and Transfer
Progress released security updates to address vulnerabilities in MOVEit Gateway and Transfer. A cyber threat actor could exploit these vulnerabilities to bypass authentication.
Jun 2024: Leadership Imposters Texting Messages
Threat Alert: Leadership Imposters
Jun 2024: BEC Emails Use TOAD-Style Technique
Threat Alert: BEC Emails Use TOAD-Style Techniq
Actively Exploited High and Other Vulnerabilities in Google Chrome
Google has released new versions of Chrome to address an Actively Exploited High and other vulnerabilities in Google Chrome.For a complete description of the vulnerabilities and affected systems go to Chrome Releases.IT SecurityRead more about IT Security service offerings.
High and Other Vulnerabilities in Multiple Atlassian Products
Atlassian has released security updates to address High and other vulnerabilities affecting multiple Atlassian products.For a complete description of the vulnerabilities and affected systems go to Atlassian Security Advisories.IT Security
Vulnerabilities in Cisco Finesse Web-Based Management Interface
Cisco has released security updates to address vulnerabilities in Cisco Finesse Web-Based Management Interface. Unauthenticated Remote Attackers could exploit these vulnerabilities to perform a stored cross site-scripting (XSS) attack.
Critical Vulnerability in Multiple ASUS Router Models
ASUS released security updates to address a Critical vulnerability in multiple ASUS Router Models. Unauthenticated attackers could exploit this vulnerability to log into affected devices.For a complete description of the vulnerabilities and affected systems go to ASUS Router - Improper Authentication.IT Security
Critical and Other Vulnerabilities Affecting Juniper Secure Analytics
Juniper Networks released security updates to address Critical and other vulnerabilities affecting multiple Juniper Secure Analytics. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
Actively Exploited Critical Vulnerability in Progress Telerik Report Servers
A security update was created to address an Actively Exploited Critical vulnerability affecting Progress Telerik Report Servers. A cyber threat actor could exploit this vulnerability to supply specific parameters and create a new administrator user, which they can then use to login to the server.
Easily Exploitable Critical Vulnerabilities in Various Open Source AI/ML Tools
The Protect AI Security Firm warns of Easily Exploitable Critical vulnerabilities in various open-source AI/ML tools. A cyber threat actor could exploit these vulnerabilities to disclose information, access to restricted resources, privilege escalation, and complete server takeover.