Tag: Vulnerable
-
17,000+ Microsoft Exchange Servers Vulnerable to Multiple Critical Vulnerabilities
Federal Office for Information Security (BSI) in Germany has announced that at least 17,000 Microsoft Exchange servers across the country …
-
Microsoft: 87% of UK Organizations Vulnerable to Costly Cyber-Attacks
Just 13% of UK organizations are resilient to cyber-attacks, with the remainder either vulnerable (48%) or at high risk (39%) of damaging …
-
More than 178,000 SonicWall firewalls are exposed to old denial of service bugs
More than 178,000 SonicWall firewalls are still vulnerable to years-old vulnerabilities, an infosec reseacher claims. A study by Jon …
-
SonicWall API opens 178k firewalls to attack
Over 178,000 SonicWall firewalls that have management interfaces exposed to the internet are at risk of denial of service (DoS) and remote …
-
Alert: Over 178,000 SonicWall Firewalls Potentially Vulnerable to Exploits – Act Now
Over 178,000 SonicWall firewalls exposed over the internet are exploitable to at least one of the two security flaws that could be …
-
Vulnerable Log4j instances persist two years after patches
TechRadar reports that vulnerable versions of the Apache Log4j software have been observed across 38% of apps between Aug. 15 and …
-
Design Flaw in Domain-Wide Delegation Could Leave Google Workspace Vulnerable to Takeover – Hunters
BOSTON, MASS. and TEL AVIV, ISRAEL, November 28, 2023 – A severe design flaw in Google Workspace’s domain-wide delegation feature …
-
Why Your API Keys Are Leaving You Vulnerable to Attack
For years, API security specialists have underscored the importance of safeguarding our APIs. Most companies have implemented an API …
-
Defending Against Attacks on Vulnerable IoT Devices
Organizational size is irrelevant. Adversaries target smaller businesses like coffee shops, apartment complexes, and TV stations because …
-
Atlassian Bug Escalated to 10, All Unpatched Instances Vulnerable
Active ransomware attacks against vulnerable Atlassian Confluence Data Center and Servers ratchets up risk to enterprises, now reflected in …
-
GOAD: Vulnerable Active Directory environment for practicing attack techniques
Game of Active Directory (GOAD) is a free pentesting lab. It provides a vulnerable Active Directory environment for pen testers to practice …
-
Arm patches GPU driver bug exploited by spyware to snoop on targets
Commercial spyware has exploited a security hole in Arm’s Mali GPU drivers to compromise some people’s devices, according to Google today. …
●●●