CISA: Mozilla Releases Security Updates for Firefox and Thunderbird
Mozilla Releases Security Updates for Firefox and Thunderbird Mozilla has released security updates to address vulnerabilities in Firefox and Thunderbird....
Mozilla Releases Security Updates for Firefox and Thunderbird Mozilla has released security updates to address vulnerabilities in Firefox and Thunderbird....
CISA Releases Microsoft 365 Secure Configuration Baselines and SCuBAGear Tool CISA has published the finalized Microsoft 365 Secure Configuration Baselines,...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Three Industrial Control Systems Advisories CISA released three Industrial Control Systems (ICS) advisories on January 4, 2024. These...
CISA Adds Six Known Exploited Vulnerabilities to Catalog CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Juniper Releases Security Advisory for Juniper Secure Analytics Juniper released a security advisory to address multiple vulnerabilities affecting Juniper Secure...
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester....
Company Name: b'GitHub' Company HackerOne URL: https://hackerone.com/github Submitted By:b'imrerad'Link to Submitters Profile:https://hackerone.com/b'imrerad' Report Title:b'GHES Management console EoP (editor to site...
Company Name: b'GitHub' Company HackerOne URL: https://hackerone.com/github Submitted By:b'ahacker1'Link to Submitters Profile:https://hackerone.com/b'ahacker1' Report Title:b'View Repo and Title of Any Private...
CISA Adds Six Known Exploited Vulnerabilities to Catalog CISA has added six new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that's equipped...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, "only 59%...
Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the vulnerabilities stemming...
NAME__________IBM CICS Transaction Gateway improper access controlsPlatforms Affected:IBM CICS Transaction Gateway Containers 9.3Risk Level:4Exploitability:UnprovenConsequences:Configuration DESCRIPTION__________IBM CICS Transaction Gateway 9.3 could...
NAME__________QEMU buffer overflowPlatforms Affected:Qemu QemuRisk Level:4.9Exploitability:UnprovenConsequences:Gain Access DESCRIPTION__________QEMU is vulnerable to a stack-based buffer overflow, caused by improper bounds checking...
NAME__________Samsung Email information disclosurePlatforms Affected:Samsung EmailRisk Level:3.3Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Email could allow a local attacker to obtain sensitive information, caused...
NAME__________Samsung Mobile Devices security bypassPlatforms Affected:Samsung mobile devicesRisk Level:6.8Exploitability:UnprovenConsequences:Bypass Security DESCRIPTION__________Samsung Mobile Devices could allow a remote authenticated attacker to...
NAME__________Samsung Mobile Devices information disclosurePlatforms Affected:Samsung mobile devicesRisk Level:4.6Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Mobile Devices could allow a local attacker to obtain...
NAME__________Samsung Mobile Devices directory traversalPlatforms Affected:Samsung mobile devicesRisk Level:4Exploitability:UnprovenConsequences:File Manipulation DESCRIPTION__________Samsung Mobile Devices could allow a local attacker to traverse...
NAME__________Samsung Nearby device scanning information disclosurePlatforms Affected:Samsung Nearby device scanningRisk Level:4Exploitability:UnprovenConsequences:Obtain Information DESCRIPTION__________Samsung Nearby device scanning could allow a local...