Flaws in pfSense firewall can lead to arbitrary code execution
Multiple flaws in pfSense firewall can lead to arbitrary code execution Pierluigi Paganini December 15, 2023 Security flaws in Netgate pfSense firewall solution can potentially…
Multiple flaws in pfSense firewall can lead to arbitrary code execution Pierluigi Paganini December 15, 2023 Security flaws in Netgate pfSense firewall solution can potentially…
Dec 15, 2023NewsroomVulnerability / Software Security Multiple security vulnerabilities have been discovered in the open-source Netgate pfSense firewall solution called pfSense that could be chained…
A new report from the United Nations Convention for Climate Change (UNFCCC) finds national climate action plans remain insufficient to limit global temperature rise to…
A cluster of malicious Python projects has been identified in PyPI, the official Python PyPI package repository, which targets both Windows and Linux systems and often…
Recently, there has been a rise in incidences of hackers using “Remote Administration Tools” to control the infected system and bypass protection technologies. Remote administration…
Web Application Security consists of a myriad of security controls that ensure that a web application: Functions as expected. Cannot be exploited to operate out…
The government has been advised to overturn all the convictions of the hundreds of subpostmasters wrongly accused in the Post Office scandal. In a letter…
Multiple vulnerabilities have been discovered in Dell’s PowerProtect, which were associated with SQL injection, cross-site scripting (XSS), privilege escalation, command injection, and path tracing. The…
In a recent turn of events, Ledger, a prominent hardware wallet provider, faced a security breach that sent shockwaves through the cryptocurrency community. The breach,…
ESET researchers analyzed a growing series of new OilRig downloaders that the group used in several campaigns throughout 2022 to maintain access to target organizations…
As we approach the dawn of 2024, the intersection of sustainability and innovation within the IT sector demands a proactive approach from decision makers. The…
A new threat actor has been discovered to be using SQL injection attacks to gain unauthorized access to organizations in the APAC region. This threat…