Generative Data Intelligence

Tag: CVSS

Chinese Spies Exploited Critical VMware Bug for Nearly 2 Years

One of the most serious VMware vulnerabilities in recent memory was secretly being exploited by a Chinese advanced persistent threat (APT) for years before...

Third Ivanti Vulnerability Exploited in the Wild, CISA Reports

A critical vulnerability affecting Ivanti Endpoint Manager Mobile (EPMM), tracked as CVE-2023-35082, has been added to CISA's Known Exploited Vulnerabilities (KEV) Catalog.The vulnerability has...

Citrix Discovers Two Vulnerabilities, Both Exploited in the Wild

Two vulnerabilities have been found in NetScaler ADC and NetScaler Gateway, formerly known as Citrix ADC and Citrix Gateway, and are affecting six supported...

150,000 WordPress Sites at Risk Due to Vulnerable Plugin

Penka Hristovska Published on: January 17, 2024 Security researchers have uncovered a pair of critical vulnerabilities in a popular...

CISA Adds 9.8 ‘Critical’ Microsoft SharePoint Bug to its KEV Catalog

On Wednesday, the Cybersecurity and Infrastructure Security Agency (CISA) added a privilege escalation vulnerability affecting Microsoft SharePoint servers to its list of Known Exploited...

Volt Typhoon Ramps Up Malicious Activity Against Critical Infrastructure

China-backed cyber espionage group Volt Typhoon is systematically targeting legacy Cisco devices in a sophisticated and stealthy campaign to grow its attack infrastructure.In many...

Ivanti Researchers Report Two Critical Zero-Day Vulnerabilities

Ivanti researchers this week flagged two zero-day vulnerabilities discovered in its products — CVE-2023-46805 and CVE-2024-21887— that are already being actively exploited by threat...

Industrial Defender Risk Signal, a Risk-Based Vulnerability Management Solution for OT Security

PRESS RELEASEFOXBOROUGH, Mass. , Jan. 3, 2024 /PRNewswire/ -- Industrial Defender, the leading provider of OT asset data and cybersecurity solutions for industrial organizations, is excited to announce...

Industrial Defender Risk Signal, a Risk-Based Vulnerability Management Solution for OT Security

PRESS RELEASEFOXBOROUGH, Mass. , Jan. 3, 2024 /PRNewswire/ -- Industrial Defender, the leading provider of OT asset data and cybersecurity solutions for industrial organizations, is excited to announce...

Ransomware Attackers Abuse Multiple Windows CLFS Driver Zero-Days

In the last year and a half, attackers have exploited at least five vulnerabilities — including four zero-days — in a sensitive, kernel-level Windows...

Microsoft: Multiple Perforce Server Flaws Allow for Network Takeover

Microsoft has identified four vulnerabilities in the Perforce source-code management platform, the most critical of which gives attackers access to a highly privileged Windows...

Will Putting a Dollar Value on Vulnerabilities Help Prioritize Them?

When videoconferencing service Zoom searched for a better way to assign a severity to vulnerabilities found during bug bounty programs, the company's security team...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?