Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3162 Results
Critical Actively Exploited Vulnerability in Acronis Cyber Infrastructure (ACI)
Acronis released security updates to address a Critical Actively Exploited vulnerability in Acronis Cyber Infrastructure (ACI). Threat actors can exploit this vulnerability to execute arbitrary code remotely due to the use of default passwords.
Vulnerabilities in Multiple Apple Products
Apple has released security updates to address vulnerabilities in multiple Apple products. For a complete description of the vulnerabilities and affected systems go to Apple Security Updates. IT Security Read more about IT Security service offerings.
2024 UC Cybersecurity Awareness Month (UC CAM) Events
Cybersecurity Awareness Month is spearheaded by the
Jul 2024: CrowdStrike-Themed Lures Lead to Malware and Credential Theft
Threat Alert: CrowdStrike- Themed Lu
Critical Vulnerability in Docker
Docker released a security update to address a Critical vulnerability in Docker. An attacker can exploit this vulnerability to bypass authorization plugins (AuthZ) under specific circumstances.For a complete description of the vulnerabilities and affected systems go to Authz zero length regression.IT Security
High and Other Vulnerabilities in Google Chrome
Google has released new versions of Chrome to address High and other vulnerabilities in Google Chrome.For a complete description of the vulnerabilities and affected systems go to Chrome Releases.IT SecurityRead more about IT Security service offerings.
Zero-Day High Vulnerability in Microsoft Windows SmartScreen
Microsoft released a security update to address a Zero-Day High vulnerability in Microsoft Windows SmartScreen. An attacker can exploit this vulnerability to bypass the SmartScreen security warning dialog and deliver malicious files. Over the past year, several attackers, including Water Hydra, Lumma Stealer, and Meduza Stealer, have exploited this vulnerability.
High Vulnerabilities in ISC BIND
The Internet Systems Consortium (ISC) has released security updates to address High vulnerabilities affecting multiple versions of ISC’s Berkeley Internet Name Domain (BIND) 9. An attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions.For a complete description of the vulnerabilities and affected systems go to BIND 9 Security Vulnerability Matrix.IT Security
Critical and Other Vulnerabilities in Multiple Cisco Products
Cisco has released security updates to address Critical and other vulnerabilities in multiple Cisco Products. For a complete description of the vulnerabilities and affected systems go to Cisco Security Advisories.IT SecurityRead more about IT Security service offerings.
High POC Available Vulnerability in the Splunk Enterprise Product
Splunk released security updates to address High, POC Available Vulnerability in the Splunk Enterprise Product. An attacker could exploit this vulnerability to perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. For a complete description of the vulnerabilities and affected systems go to Splunk Security AdvisoriesIT Security