New Typosquatting and Repojacking Tactics Uncovered on PyPI
Security researchers have identified a concerning uptick in malicious activities infiltrating open-source platforms and code repositories. This trend encompasses a wide...
Security researchers have identified a concerning uptick in malicious activities infiltrating open-source platforms and code repositories. This trend encompasses a wide...
Security researchers have uncovered a sophisticated malware campaign targeting Redis, a popular data store system. This campaign, dubbed “Migo,” employs...
ISC Releases Security Advisories for BIND 9 The Internet Systems Consortium (ISC) released security advisories to address vulnerabilities affecting multiple...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on February 13, 2024. These...
Adobe Releases Security Updates for Multiple Products Adobe has released security updates to address vulnerabilities in Adobe software. A cyber...
Microsoft Releases Security Updates for Multiple Products Microsoft has released security updates to address vulnerabilities in multiple products. A cyber threat...
CISA and MS-ISAC Release Advisory on Compromised Account Used to Access State Government Organization Today, CISA and the Multi-State Information...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Seventeen Industrial Control Systems Advisories CISA released seventeen Industrial Control Systems (ICS) advisories on February 15, 2024. These...
CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on February 20, 2024. These...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...
CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on February 20, 2024. These...
The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...
The Information provided at the time of posting was detected as "Sliver C2". Depending on when you are viewing this...
NAME__________EBM Technologies RISWEB information disclosurePlatforms Affected:EBM Technologies RISWEB 1.x EBM Technologies RISWEB 2.xRisk Level:5.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________EBM Technologies RISWEB could allow...
NAME__________Landing Page Cat plugin for WordPress information disclosurePlatforms Affected:WordPress WordPress WordPress Landing Page Cat plugin for WordPress 1.7.2 WordPress Landing...
NAME__________Oracle MySQL Server unspecifiedPlatforms Affected:Oracle MySQL Server 8.0.35 Oracle MySQL Server 8.2.0Risk Level:4.4Exploitability:UnprovenConsequences:Unknown DESCRIPTION__________An unspecified vulnerability in Oracle MySQL Server...
NAME__________Dell RecoverPoint for Virtual Machines command executionPlatforms Affected:Dell EMC RecoverPoint for Virtual Machines 5.3Risk Level:7.2Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell RecoverPoint for Virtual...
NAME__________Dell RecoverPoint for Virtual Machines brute forcePlatforms Affected:Dell EMC RecoverPoint for Virtual Machines 5.3Risk Level:6.5Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________Dell RecoverPoint for Virtual...