Tag: Vulnerable
-
Over 850 Vulnerable Devices Secured Through CISA Ransomware Program
US government and critical infrastructure entities were sent 1754 ransomware vulnerability notifications under the Ransomware Vulnerability …
-
Damn Vulnerable RESTaurant: Open-source API service designed for learning
Damn Vulnerable RESTaurant is an open-source project that allows developers to learn to identify and fix security vulnerabilities in their …
-
Microsoft .NET, .NET Framework, & Visual Studio Vulnerable To RCE Attacks
A new remote code execution vulnerability has been identified to be affecting multiple Microsoft products including .NET, .NET Framework …
-
Windows Apps Vulnerable to Command Injection via “BatBadBut” Flaw
Flatt Security has discovered a critical vulnerability called “BatBadBut” that could allow attackers to inject malicious commands into …
-
91,000 Smart LG TV Devices Vulnerable to Remote Takeover
Cybersecurity researchers from Bitdefender discovered critical vulnerabilities in LG TVs running webOS versions 4 through 7. These …
-
17,000+ Microsoft Exchange Servers Vulnerable to Multiple Critical Vulnerabilities
Federal Office for Information Security (BSI) in Germany has announced that at least 17,000 Microsoft Exchange servers across the country …
-
Microsoft: 87% of UK Organizations Vulnerable to Costly Cyber-Attacks
Just 13% of UK organizations are resilient to cyber-attacks, with the remainder either vulnerable (48%) or at high risk (39%) of damaging …
-
More than 178,000 SonicWall firewalls are exposed to old denial of service bugs
More than 178,000 SonicWall firewalls are still vulnerable to years-old vulnerabilities, an infosec reseacher claims. A study by Jon …
-
SonicWall API opens 178k firewalls to attack
Over 178,000 SonicWall firewalls that have management interfaces exposed to the internet are at risk of denial of service (DoS) and remote …
-
Alert: Over 178,000 SonicWall Firewalls Potentially Vulnerable to Exploits – Act Now
Over 178,000 SonicWall firewalls exposed over the internet are exploitable to at least one of the two security flaws that could be …
-
Vulnerable Log4j instances persist two years after patches
TechRadar reports that vulnerable versions of the Apache Log4j software have been observed across 38% of apps between Aug. 15 and …
-
Design Flaw in Domain-Wide Delegation Could Leave Google Workspace Vulnerable to Takeover – Hunters
BOSTON, MASS. and TEL AVIV, ISRAEL, November 28, 2023 – A severe design flaw in Google Workspace’s domain-wide delegation feature …
●●●