Tran Hoang PhongforFIS Securityblog.fiscybersec.com·Nov 17, 2024Citrix và Fortinet cập nhật các bản vá bảo mật quan trọngNgày 12/11/2024, Citrix và Fortinet đã công bố bản vá cho hơn một chục lỗ hổng bảo mật, bao gồm các lỗ hổng nghiêm trọng ảnh hưởng đến NetScaler và FortiOS. 1. Chi tiết thông tin lỗ hổng của Citrix Citrix đã phát hành bản sửa lỗi cho: Hai lỗ hổng tr...Discuss·44 readsNewslettersFortinet
Ronald Bartelshubandspoke.amastelek.com·Nov 8, 2024🥷Fortinet’s Persistent Vulnerabilities | A Persistent Threat & Essential Mitigations🥸Over recent years, Fortinet’s infrastructure has faced numerous, often critical vulnerabilities, many of which are actively exploited and recurrently flagged by CISA as among the most widely exploitable. In some cases, Fortinet vulnerabilities outpac...DiscussFortinet
Rao Waqas Akramraowaqasakram.hashnode.dev·Oct 24, 2024🌐 Celebrating 25 Years of CVEs! 🌐🌐 Celebrating 25 Years of CVEs! 🌐 Tenable has released an insightful article on the evolution of vulnerabilities, marking 25 years of CVE. From the first 321 records in 1999 to over 240,000 today, this milestone highlights the critical impact of ...Discuss·33 readsvulnerabilities
Đinh Văn MạnhforFIS Securityblog.fiscybersec.com·Oct 22, 2024Atlassian Vá Các Lỗ Hổng Bảo Mật Trong Bitbucket, Confluence, và JiraAtlassian, công ty nổi tiếng với các sản phẩm quản lý dự án và cộng tác như Bitbucket, Confluence, và Jira, đã phát hành các bản vá bảo mật quan trọng để khắc phục nhiều lỗ hổng nghiêm trọng. Những lỗ hổng này có thể bị khai thác để tấn công hệ thống...DiscussNewslettersBitbucket
Shruti RajeshforZySec AIblog.zysec.ai·Oct 14, 2024The Role of AI in Mitigating the Latest Zero-Day VulnerabilitiesIn the wild, wild west of the digital universe, zero-day vulnerabilities are the renegade bandits, lurking in the shadows, ready to wreak havoc faster than you can say “cyberspace showdown.” But fear not! AI is here, galloping in like a mustachioed s...Discusszysec
Auth0x78auth0x78-blog.hashnode.dev·Oct 10, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...Discuss·1 likeBuffer Overfow
Isael Melendezismele.hashnode.dev·Oct 9, 2024Learning Nessus EssentialsWhen we start in the cybersecurity field, principally studying to obtain CompTIA Security+ and more closely to Vulnerability Scanning Tools in theory, you may remember the name “ NESSUS”. I’m pretty sure you remembered it. So, What’s NESSUS? Why is i...Discuss·3 likesnessus
Ronald Bartelshubandspoke.amastelek.com·Oct 5, 2024🧑🏫Basic Cybersecurity Practices | Lessons from the Latest CUPS Print System Vulnerability🥷Recent vulnerabilities, such as the one discovered in the CUPS (Common UNIX Printing System) print system, serve as important reminders of basic cybersecurity practices that are often overlooked. Many of these vulnerabilities can have disastrous effe...Discusscybersecurity
Abdul-Hafiz Aderemihafizaderemi.hashnode.dev·Sep 21, 2024API Security Guide: Safeguarding Your Backend from VulnerabilitiesAPIs (Application Programming Interfaces) are the backbone of modern web applications, enabling seamless integration between different systems and services. However, if not properly secured, APIs can expose organizations to significant risks, includi...Discuss·75 readsapi
Rishi BakshiforRishi Bakshi Blogrishibakshi.hashnode.dev·Sep 10, 2024Understanding use server and Avoiding Data Leaks in Next.jsOne of the common misconceptions in Next.js is the belief that adding the use server directive to a component will automatically turn it into a server component. However, this isn't accurate. The use server directive is used to create server actions,...DiscussYou Don't Know Next.jsdata-access-layer