Author: Cybernoz
BeyondTrust has fixed an unauthenticated command injection vulnerability (CVE-2024-12356) in its Privileged Remote Access (PRA) and Remote Support (RS) products…
Dec 18, 2024Ravie LakshmananCyber Fraud / Social engineering INTERPOL is calling for a linguistic shift that aims to put to…
The ransomware juggernaut rolled inexorably onwards in 2024, yet again, leaving more devastated victims in its wake. This year, the…
In 2024, we shipped numerous features to help security teams manage their growing attack surface. Some examples are Domain Connectors…
Two critical vulnerabilities have been discovered in Apache Tomcat, the popular open-source web server, and servlet container, potentially allowing attackers…
GFI Software’s Kerio Control, a popular UTM solution, was found to be vulnerable to multiple HTTP Response Splitting vulnerabilities, which…
Appdome announced that the Appdome Mobile Defense Platform now protects applications running on mobile-enabled platforms like Apple macOS, Apple visionOS,…
“Not everyone runs Kubernetes in production, but everyone has a Kubernetes proof-of-concept project” – that’s the kind of thing you…
The Mask APT is back after 10 years of silence Pierluigi Paganini December 18, 2024 Kaspersky researchers linked a new…
With critical SAP vulnerabilities being weaponized within 72 hours of a patch release, and unprotected SAP applications provisioned in cloud…
A Proof of Concept (PoC) exploit for the critical path traversal vulnerability identified as CVE-2024-38819 in the Spring Framework has…
Stairwell announces Stairwell Core, which enables organizations to privately collect, store, and continuously reassess executable files so they can confidently…











