Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
1509 Results
Actively Exploited and Other Vulnerabilities in Multiple Apple Products
Apple has released security updates to address actively exploited and other vulnerabilities in multiple Apple products. A cyber threat actor could exploit this vulnerability to take control of an affected device. For a complete description of the vulnerabilities and affected systems go to:
Vulnerabilities in ISC BIND
The Internet Systems Consortium (ISC) has released security updates to address vulnerabilities affecting ISC Berkeley Internet Name Domain (BIND) 9.
Vulnerabilities in Atlassian Products
Atlassian has published a security bulletin to address vulnerabilities in multiple products. A malicious cyber actor could exploit some of these vulnerabilities to take control of an affected system.
Vulnerability in Drupal Core
Drupal has released security updates to address a vulnerability in multiple versions of Drupal. A malicious cyber actor could exploit this vulnerability to take control of an affected system.
Critical Vulnerability in GitLab
GitLab released security updates to address a Critical vulnerability in GitLab. Attacker can abuse scan execution policies to run pipeline as another user.
Vulnerabilities in Nagios XI Network Monitoring Software
Nagios released security updates to address vulnerabilities in Nagios XI network monitoring software. An attacker could exploit these vulnerabilities to escalate privileges and disclose information.
For a complete description of the vulnerabilities and affected systems go to Nagios Xl Change Log.
IT Security
Vulnerabilities in Kubernetes
Kubernetes released security advisories to address vulnerabilities in Kubernetes. An attacker could exploit some of these vulnerabilities to take control of an affected system. For a complete description of the vulnerabilities and affected systems go to Kubenetes Security Advisories. IT Security
Sep 2023: Phishing Lure Uses Potential Employment Status Theme
Threat Alert: Employment Status-Themed Phishing Lures Cybercriminals have launched a series of phishing attacks using concerns over the recipient’s employment status legality as a lure. The lures contain a link purportedly related to employment status documentation. Key Actions (at Work and at Home)
Vulnerabilities Affecting Multiple SAP Products
SAP released their September 2023 updates to address vulnerabilities in various SAP products. An attacker could exploit these vulnerabilities to take control of an affected system. For a complete description of the vulnerabilities and affected systems go to SAP Security Patch Day –September 2023. IT Security
Vulnerabilities in Multiple Mozilla Products
Mozilla released security updates to address vulnerabilities in multiple Mozilla products. An attacker could exploit some of these vulnerabilities to take control of an affected system. For a complete description of the vulnerabilities and affected systems go to Mozilla Foundation Security Advisories. IT Security